Across
- 4. Pretending to be someone else to gain access or information
- 5. A phishing attack aimed at top-level executives
- 8. Searching through trash to find confidential information
- 9. A voice call scam pretending to be from a trusted source
- 10. A scam email that targets a specific person using personal details
- 11. Creating a believable story to get someone to reveal sensitive data
Down
- 1. When private info is leaked or stolen from a company or website
- 2. Following someone into a secure area without authorization
- 3. Tricking people into giving up private info by pretending to be trustworthy
- 6. A fake email that tricks you into giving away personal info
- 7. Phishing that comes through text messages
