Types of Social Engineering Tactics

12345678910111213
Across
  1. 1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. 5. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. 6. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  4. 12. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
  5. 13. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
  1. 2. This attack targets individuals who can give the criminal physical access to a secure building or area.
  2. 3. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  3. 4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  4. 7. This attack centers around an exchange of information or service to convince the victim to act.
  5. 8. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  6. 9. A type of monitoring software designed to record keystrokes made by a user.
  7. 10. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. 11. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.