Loh Jen Hin - 8 Lyra_Social Engineering

12345678
Across
  1. 2. an agreement between two or more parties in which there is a reciprocal exchange of goods or services
  2. 4. plays on a victim's emotions by utilizing a sense of urgency, offering a deal that is too good to be true or trying to gain sympathy to scam a victim
  3. 6. AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY.
  4. 7. These are attacks in which the victim is asked in ap or a social media post to combine a few pieces of info or complete a short quiz to produce a name
  5. 8. AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA(ATM MACHINE)
Down
  1. 1. AN ATTACK IN WHICH THE VICTIM RECEIVES AN EMAIL DISGUISED TO LOOK AS IF IT HAS COME FROM A REPUTABLE SOURCE, IN ORDER TO TRICK THEM INTO GIVING UP VALUABLE DATA.
  2. 3. a type of malware attack that claims to have detected a virus or other issue on a device and directs the user to download or buy malicious software to resolve the problem
  3. 5. attack where an unauthorized person gains physical access to an off-limits location