1.1 Compare and contrast different types of social engineering techniques Flashcards

1
Q

Social Engineering

A

The attempt to use psychological methods to manipulate individuals into providing their personal information or gaining access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

The attempt to obtain personal information by pretending to be a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smishing

A

Also known as SMS phishing, it is the use of phishing methods through text messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vishing

A

Also known as voice phishing, it is the use of phishing methods through the telephone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SPAM

A

Irrelevant or unsolicited messages sent to a large number of internet users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spam over Internet Messaging (SPIM)

A

The delivery of spam through the use of instant messaging instead of through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear Phishing

A

A targeted version of phishing. It goes after a specific individual or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster Diving

A

The attempt to extract sensitive information, such as discarded equipment and documents by searching from the garbage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shoulder Surfing

A

Involves looking over someone’s shoulder to obtain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Does not require the user to be tricked into clicking a link. Instead, it redirects victims from a legitimate site to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tailgating

A

It involves piggybacking or following closely behind someone who has authorized physical access in an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Eliciting Information

A

A technique to obtain information from others without asking them directly or arousing their suspicion through casual conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whaling

A

Similar to spear phishing but goes after high-profile targets, such as an executive within a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prepending

A

Adding something malicious to the beginning of what is assumed to be a safe file or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity Fraud

A

Stealing an individual’s identity and using their personal information without authorization to deceive or commit a crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Invoice Scams

A

When a scammer sends your business an invoice for goods or services that you did not agree to purchase. Then the scammer sends you a bill.

17
Q

Credential Harvesting

A

Phishing campaigns that involves capturing usernames and passwords.

18
Q

Reconnaissance

A

When a hacker covertly gathers information about a system or organization.

19
Q

Hoax

A

A fake threat

20
Q

Impersonation

A

Acting like another person. The thief will pretend to be a person known to the victim and steal information from the victim through trickery.

21
Q
A

like spear phishing. However, instead of using email, the attacker attacks a site that the target frequently visits.

22
Q

Typo squatting

A

Also known as URL hijacking, relies on typographic errors users make on the Internet. It can be as simple as accidentally typing www.gooogle.com instead of www.google.com.

22
Q

Pretexting

A

Where the attacker creates a scenario that convinces the victim to trust him or to give up personal information.