Across
- 2. A large scale social engineering and extortion attack that defeated the multifactor authentication of tech giants like Microsoft and Nvidia.
- 4. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- 5. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- 6. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- 8. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- 11. This attack targets individuals who can give the criminal physical access to a secure building or area.
- 13. A documentary made about how scammers can mask their identities, charm their victims, and swindle them for billions of dollars.
- 17. The first stage of social engineering, the perpetrator explores the victim's background to determine points of entry to conduct the attack.
- 19. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
- 20. The third stage of social engineering, the perpetrator carries out the attack on the victim.
- 21. Training done in an effort to learn about security before it is too late.
- 22. Eliminates the chances of an uninvited user digging through your sensitive data.
Down
- 1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
- 3. An online manipulation technique that exploits human psychology in order to gain sensitive information, access or valuables from users.
- 7. Software that scans your computer to make sure that there are no vulnerabilities that attackers can take advantage of.
- 9. This attack centers around an exchange of information or service to convince the victim to act.
- 10. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- 12. A type of monitoring software designed to record keystrokes made by a user.
- 14. The second stage of social engineering, the perpetrator uses the information gathered to plan their mode of attack.
- 15. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- 16. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- 18. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
