Social Engineering

1234567891011121314
Across
  1. 2. A high-profile company that fell victim to a whaling attack in 2016, resulting in significant financial losses.
  2. 3. A phishing attack that targets high-profile individuals such as executives.
  3. 4. Engineering The manipulation of people into performing actions or divulging confidential information through psychological tactics.
  4. 8. The act of attackers creating a fabricated scenario to steal information.
  5. 9. A physical security breach method where an attacker follows someone into a restricted area without authorization.
  6. 10. A psychological principle exploited in social engineering where individuals fear missing out.
  7. 11. A type of social engineering attack conducted over the phone.
  8. 12. When an authorized person allows an unauthorized person to enter a restricted area.
  9. 14. Pro Quo A method where attackers offer something in exchange for information.
Down
  1. 1. Manipulation Techniques Methods used in social engineering such as urgency, fear, and flattery to influence behavior.
  2. 5. Phishing Attackers create fake profiles and send connection requests to gather information and send phishing messages.
  3. 6. Leaving infected USB drives in public places to lure victims.
  4. 7. A social engineering attack that involves sending fraudulent text messages.
  5. 8. A type of social engineering attack that involves sending fraudulent messages designed to trick individuals into revealing sensitive information.
  6. 10. Phishing A form of phishing that uses personalized messages to target a specific individual or organization.
  7. 13. The act of pretending to be a trusted individual or organization to deceive someone.