Across
- 2. What attackers exploit to manipulate you in social engineering attacks.
- 4. The act of checking or confirming the authenticity of a caller before sharing sensitive information.
- 5. The system utility in Windows that allows users to view and adjust system settings.
- 7. Department responsible for assisting users with IT issues, often impersonated in pretexting attacks.
- 8. The location where Rachel's fake tech support character supposedly worked.
- 10. Software designed to detect and destroy malware.
Down
- 1. World-renowned security consultant and former hacker who helped popularize social engineering.
- 3. Network security system that monitors and controls incoming and outgoing network traffic.
- 6. A form of social engineering where the attacker lies to obtain restricted information.
- 9. CEO of SocialProof Security and expert in social engineering.
