Lee Jun Ming 8Lyra social engineering

123456
Across
  1. 3. ARGUABLY CREATES THE LARGEST RISK OF THE DATA BEING COMPROMISED.
  2. 5. they will ask you to put your name in the web site
  3. 6. IS AN ATTACK IN WHICH THE VICTIM RECEIVES AN EMAIL DISGUISED TO LOOK AS IF IT HAS COME FROM A REPUTABLE SOURCE, IN ORDER TO TRICK THEM INTO GIVING UP VALUABLE DATA.
Down
  1. 1. IS AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA.
  2. 2. ________phishingkeyindicatorsofa
  3. 4. IS AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY.