Across
- 2. Phishing through SMS messages
- 5. A directed phishing attack.
- 7. Closing records when you're leaving a job
- 8. Used to validate emails
- 9. An attack targeting individuals with a high net worth or high status.
- 11. A fake website that is used to steal personal information.
- 12. Training when you're hired
Down
- 1. Phishing through phone calls
- 3. Personal information
- 4. Stored in a cache, this redirects a legitimate URL to an incorrect IP address.
- 6. A ________ attack often appears as a legitimate e-mail asking the user to click a link.
- 10. A document containing information on proper usage
