1.1 Compare and contrast different types of social engineering techniques Flashcards
Social Engineering
The attempt to use psychological methods to manipulate individuals into providing their personal information or gaining access to systems.
Phishing
The attempt to obtain personal information by pretending to be a trustworthy entity.
Smishing
Also known as SMS phishing, it is the use of phishing methods through text messaging.
Vishing
Also known as voice phishing, it is the use of phishing methods through the telephone.
SPAM
Irrelevant or unsolicited messages sent to a large number of internet users.
Spam over Internet Messaging (SPIM)
The delivery of spam through the use of instant messaging instead of through email
Spear Phishing
A targeted version of phishing. It goes after a specific individual or group.
Dumpster Diving
The attempt to extract sensitive information, such as discarded equipment and documents by searching from the garbage.
Shoulder Surfing
Involves looking over someone’s shoulder to obtain information.
Pharming
Does not require the user to be tricked into clicking a link. Instead, it redirects victims from a legitimate site to a fake website.
Tailgating
It involves piggybacking or following closely behind someone who has authorized physical access in an environment
Eliciting Information
A technique to obtain information from others without asking them directly or arousing their suspicion through casual conversation.
Whaling
Similar to spear phishing but goes after high-profile targets, such as an executive within a company.
Prepending
Adding something malicious to the beginning of what is assumed to be a safe file or application.
Identity Fraud
Stealing an individual’s identity and using their personal information without authorization to deceive or commit a crime.
Invoice Scams
When a scammer sends your business an invoice for goods or services that you did not agree to purchase. Then the scammer sends you a bill.
Credential Harvesting
Phishing campaigns that involves capturing usernames and passwords.
Reconnaissance
When a hacker covertly gathers information about a system or organization.
Hoax
A fake threat
Impersonation
Acting like another person. The thief will pretend to be a person known to the victim and steal information from the victim through trickery.
like spear phishing. However, instead of using email, the attacker attacks a site that the target frequently visits.
Typo squatting
Also known as URL hijacking, relies on typographic errors users make on the Internet. It can be as simple as accidentally typing www.gooogle.com instead of www.google.com.
Pretexting
Where the attacker creates a scenario that convinces the victim to trust him or to give up personal information.