Across
- 3. How are people targeted through Pharming?
- 5. How are people targeted through Phishing?
- 6. What cyber scam is described by this statement - "a cyber attack intended to redirect a website's traffic to another, fake site."
Down
- 1. Social Engineering takes advantage of which security flaw in a computer system?
- 2. Manipulating people to give-up information
- 4. Tricking a person into revealing some personal information
