My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Cybersecurity Social Media

For two-word answers, skip a box by moving to it with your mouse.
Across
One good way you can prevent social engineers from drawing a bead on you is by NOT doing what?
Commandeering email accounts and spamming their contact lists.
True or False, social media is one of the most common tools utilized by phishers and social engineers?
Grabs information from an unwitting victim via email or text seeking information to help with a more significant crime.
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Are phishing attacks a form of social engineering?
The voice version of phishing because a phone is used instead of email.
Down
To take advantage of potential victim's natural tendencies and emotional reactions.
True or False, social engineering could occur through all of these: fax, internet phone, and social media.
Fraudster tries to target or "spear" a specific person. Email appears to come from a high-level executive asking for information.
Victim takes the bait like a fish reacting to a worm on the hook. Enticing the target into action.
Use of interesting ploy or pretext to capture someone's attention (e.g., you have been named a beneficiary in a will).
Scam involving an exchange - I give you this, you give me that. Fraudsters make the victim believe it is a fair exchange, but it is far from it.
Could a request for confidential documents or to grant access be a possible social engineering scheme?