Cyber Gym

123456789101112
Across
  1. 3. Don't act in a ......
  2. 6. Be ...... of obvious errors
  3. 7. Using phone calls to deceive victims into providing sensitive information
  4. 8. Withdrawals from their ...... account
  5. 9. Computer scam to obtain confidential data like passwords, codes, pins, credit card numbers from the victim
  6. 12. Don't ...... or open suspicious emails
Down
  1. 1. ...... can be committed at the expense of the victim
  2. 2. Similar to spear phishing but aimed at high-profile targets like CEOs or CFOs
  3. 4. Legit email received
  4. 5. The scammer's ultimate goal is to extort ...... or even steal the victim's identity
  5. 10. Check the ...... email address
  6. 11. Don't trust ...... emails