1.1 1/3 Flashcards
phishing
a type of cyver attack in which an attacker sends a fradulent email or message to avictim digsuised as a legetimate communication from a trusted source with the intention of tricking the victim into giving up sensitive information such as login credentials or financial data
Smishing
A type of phishing attack that takes place over SMS text message, in which the attacker sends a fraudulent message to the victim, usually with a link or phone number to call, in an attempt to obtain sensitive information.
Vishing
A type of phishing attack that takes place over the phone, in which the attacker calls the victim, usually pretending to be from a legitimate source, such as a bank, and attempts to obtain sensitive information.
Spam
Unsolicited commercial messages sent through email or other messaging platforms.
Spear phishing:
: A type of phishing attack that is specifically targeted at a particular individual or group of individuals, usually with the goal of stealing sensitive information or credentials.
Dumpster diving
A physical method of gathering information in which an attacker searches through the trash or recycling bins of a target organization, looking for sensitive or valuable information.
Shoulder Surfing
A physical method of gathering information in which an attacker looks over the shoulder of a victim who is entering sensitive information, such as a password, into a computer or other device.
Spim
Unsolicited commercial messages sent through instant messaging or other real-time communication platforms.
pharming
A type of cyber attack that redirects victims to a fraudulent website, often through the manipulation of the Domain Name System (DNS), in an attempt to steal sensitive information.
tailgating
A physical security breach in which an unauthorized person follows an authorized person into a secure location, such as a building or room, without proper identification or clearance.
eliciting information
The act of obtaining sensitive or confidential information through the use of social engineering techniques, such as pretexting or manipulation.
Whaling
A type of spear phishing attack that targets high-level executives or other individuals with access to sensitive information, in an attempt to steal confidential data or credentials.