Across
- 3. A social engineering tactic where an attacker fabricates a story to obtain information.
- 6. A set of rules that an organization follows to maintain security.
- 7. False alarms or fake warnings designed to trick people into taking action.
- 8. A documented series of steps to follow for security practices.
- 13. Phishing attacks carried out via SMS text messages.
- 16. Manipulating people into revealing confidential information.
- 17. Unauthorized access to or manipulation of computer systems or networks.
- 18. A cyberattack where fraudulent emails trick users into revealing sensitive data.
Down
- 1. Malicious software designed to frighten users into downloading harmful programs.
- 2. A tactic where an attacker manipulates a target into seeking their help, ultimately gaining access to sensitive information.
- 3. Gaining unauthorized access to a secured area by following an authorized person.
- 4. A targeted phishing attack aimed at a specific individual or organization.
- 5. The act of spying on someone’s screen or keyboard to obtain sensitive information.
- 9. The act of searching through trash to find confidential information.
- 10. A social engineering attack that lures victims with a tempting offer to steal their information.
- 11. To reduce the impact or risk of a security threat.
- 12. Abbreviation for gathering publicly available information to analyze a target.
- 14. Phishing attacks conducted over voice calls.
- 15. A phishing attack targeting high-profile executives or important individuals.
