Across
- 2. a Regulation in EU law on data protection and privacy in the EU and the European Economic Area.
- 4. This is the capture of confidential data by observation of a target, while passwords or PIN numbers are being input into a computing device, such as a tablet, ATM machine or door entry system.
- 6. A collection of techniques that use human vulnerabilities to manipulate people into performing actions or divulging sensitive information.
- 7. A way for a user to authenticate by using two or more separate forms of identification.
- 10. A phishing attack targeted at a specific person or group.
- 11. An algorithm on a computer system bypasses security controls
- 12. The creation of a website domain that is made to look like a bona fide website.
- 14. The act of following someone into a secured area, usually by exploiting someone’s courtesy of “holding the door”.
- 16. Unsolicited emails that are sent out in bulk.
- 17. a string of characters that allows access to a computer system or service.
- 18. Occurs when the login credentials for webmail, domain access, VPN access, etc. are collected via a compromised web browser, application, malware or DNS server.
Down
- 1. A social engineering scam in which confidential information (such as credit card information) is extracted from a target over the telephone for financial gain.
- 3. A social engineering technique in which the attacker masquerades as a legitimate website or communication in order to acquire sensitive information, such as passwords or credit card information.
- 5. Process whereby the attacker examines the contents of waste bins, skips or recycling bins for the purpose of obtaining confidential information, such as invoices, email printouts or company memos.
- 8. Malware that attempts to extort money from a user or organisation by taking control of the victim’s machine, files or documents.
- 9. Used to send information from your computer to a third party without your consent.
- 11. A form of social engineering in which an attacker lures a victim with a false promise that appeals to greed or curiosity, such as a USB attack
- 13. Any event where confidential data is viewed, transmitted, stolen or used by an unauthorised individual.
- 15. An umbrella term used to describe any malicious software.
