Across
- 1. Combines technique from question 1 and , but engages the target through SMS/text messages.
- 5. Is a social engineering technique in which an attacker sends fraudulent emails, claiming to be from a reputable and trusted source.
- 6. Be care full with what personal information you share in your online presence or risk falling victim to ___, where an attacker uses that information to create a compelling, targeted attack.
Down
- 2. If you get ___ request from your friends, they could potentially be social engineers attacks.
- 3. When an attacker offers a free music download or gift card in an attempt to trick the user into providing credentials, that's ____.
- 4. Social engineers typically use fear and ____ to trick users into committing risky actions.
- 7. Not all social engineering attacks take place online such as in vishing where the attacker attempts to trick a victim into disclosing sensitive information or granting access to the target's computer over the---.
