1.1 Flashcards

Compare and contrast different types of social engineering

1
Q

Phishing

A

Social engineering combined with spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Typosquating

A

Type of url highjacking, buys misspelled domains of trusted ones - Googel.com vs Google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pharming

A

Redirecting a legitimate website to a bogus site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vishing

A

It’s phishing, but over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smishing

A

It’s phishing, but it’s over text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

Targeted phishing attacks, usually fueled by information gathered to recon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impersonation

A

Attackers pretend to be someone they aren’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity Fraud

A

Attackers using your identity to perform attacks in other places (Credit Car Fraud, Bank Fraud, Government Fraud…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dumpster Diving

A

Valid way to gather important details, details that can be used for attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spam

A

Unsolicited Messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SPIM

A

Spam over instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tailgating

A

Use an authorized person to gain unauthorized access to a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Invoice Scams

A

Attacker sends fake invoice, usually paired with spear phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Credential Harvesting

A

Attackers target stored credentials on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly