1.1 Compare and contrast different types of social engineering techniques Flashcards
Social Engineering
The attempt to use psychological methods to manipulate individuals into providing their personal information or gaining access to systems.
Phishing
The attempt to obtain personal information by pretending to be a trustworthy entity.
Smishing
Also known as SMS phishing, it is the use of phishing methods through text messaging.
Vishing
Also known as voice phishing, it is the use of phishing methods through the telephone.
SPAM
Irrelevant or unsolicited messages sent to a large number of internet users.
Spam over Internet Messaging (SPIM)
The delivery of spam through the use of instant messaging instead of through email
Spear Phishing
A targeted version of phishing. It goes after a specific individual or group.
Dumpster Diving
The attempt to extract sensitive information, such as discarded equipment and documents by searching from the garbage.
Shoulder Surfing
Involves looking over someone’s shoulder to obtain information.
Pharming
Does not require the user to be tricked into clicking a link. Instead, it redirects victims from a legitimate site to a fake website.
Tailgating
It involves piggybacking or following closely behind someone who has authorized physical access in an environment
Eliciting Information
A technique to obtain information from others without asking them directly or arousing their suspicion through casual conversation.
Whaling
Similar to spear phishing but goes after high-profile targets, such as an executive within a company.
Prepending
Adding something malicious to the beginning of what is assumed to be a safe file or application.
Identity Fraud
Stealing an individual’s identity and using their personal information without authorization to deceive or commit a crime.