Across
- 3. ARGUABLY CREATES THE LARGEST RISK OF THE DATA BEING COMPROMISED.
- 5. they will ask you to put your name in the web site
- 6. IS AN ATTACK IN WHICH THE VICTIM RECEIVES AN EMAIL DISGUISED TO LOOK AS IF IT HAS COME FROM A REPUTABLE SOURCE, IN ORDER TO TRICK THEM INTO GIVING UP VALUABLE DATA.
Down
- 1. IS AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA.
- 2. ________phishingkeyindicatorsofa
- 4. IS AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY.
