Social Engineering

12345678910111213141516171819202122
Across
  1. 2. A large scale social engineering and extortion attack that defeated the multifactor authentication of tech giants like Microsoft and Nvidia.
  2. 4. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  3. 5. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  4. 6. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  5. 8. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  6. 11. This attack targets individuals who can give the criminal physical access to a secure building or area.
  7. 13. A documentary made about how scammers can mask their identities, charm their victims, and swindle them for billions of dollars.
  8. 17. The first stage of social engineering, the perpetrator explores the victim's background to determine points of entry to conduct the attack.
  9. 19. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
  10. 20. The third stage of social engineering, the perpetrator carries out the attack on the victim.
  11. 21. Training done in an effort to learn about security before it is too late.
  12. 22. Eliminates the chances of an uninvited user digging through your sensitive data.
Down
  1. 1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. 3. An online manipulation technique that exploits human psychology in order to gain sensitive information, access or valuables from users.
  3. 7. Software that scans your computer to make sure that there are no vulnerabilities that attackers can take advantage of.
  4. 9. This attack centers around an exchange of information or service to convince the victim to act.
  5. 10. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  6. 12. A type of monitoring software designed to record keystrokes made by a user.
  7. 14. The second stage of social engineering, the perpetrator uses the information gathered to plan their mode of attack.
  8. 15. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  9. 16. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  10. 18. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.