1.1 Flashcards

1
Q

Phishing

A

sending emails to users w/the purpose of tricking them to click a link and revealing personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

form of phishing that uses text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

phone phising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

unwanted or unsolicited bulk email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SPIM

A

spam over instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

targeted phishing w/inside info

targets employees within a company and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster Driving

A

searching through trash to gain info from discarded documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder Surfing

A

looking over someone’s shoulder to gain infomation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

hijacking a user’s browser so they’re automatically redirected to a malicious website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A

following closely behind another w/o showing credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting Information

A

act of getting info w/o asking for it directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

form of spear phishing that targets high-level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A

adding code to the beginning of a presumingly safe file that will get activated once the file is opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Fraud

A

actual use of stolen information for illicit gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice Scams

A

a phisher pretending to be a vendor requesting payment for goods or services that was never requested or received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential Harvesting

A

attempt to trick users into entering their credentials into a fraudulent website to steal their login information

17
Q

Reconnaissance

A

gathering as much info as possible from open source sources on a target.

18
Q

Hoax

A

a fake message warning the recipient of a non-existent computer threat virus

19
Q

Impersonation

A

a malicious actor pretends to be a legitimate user or service to gain access to protected info

20
Q

Watering Hole Attack

A

commonly visited website from a particular group of people that an attacker will infect w/malware to infect the visitor’s systems

21
Q

Typosquatting (URL hijacking)

A

Someone that buys a domain name that is close to a legitimate domain name

22
Q

Pretexting

A

A fake scenario added to a convo to make a request more believable

23
Q

Influence Campaigns

A

Use of a variety of sources to influence public perception

24
Q

Hybrid Warfare

A

Blend of conventional warfare w/unconventional methods to influence people

25
Q

Authority

A

They’re in charge

26
Q

Social Engineering

A

Use of one or more psychology-based principles to increase the effectiveness of their attacks

27
Q

Intimidation

A

Bullying tactics

28
Q

Consensus(social proof)

A

creation of websites w/fake testimonials that promote a product

29
Q

Scarcity/Urgency

A

a belief that something is in short supply or almost gone

30
Q

Trust/Familiarity

A

attacker establishes a common contact or friend to gain trust