1.1 Compare and contrast different types of social engineering techniques Flashcards
Phishing
An attempt to fraudulently obtain information from a user
Smishing
Phishing conducted over text messages (SMS)
Vishing
Spam
Spam over instant messaging (SPIM)
Spear phishing
Dumpster diving
Shoulder surfing
Pharming
Tailgating
Eliciting information
Whaling
Prepending
Identity fraud
Invoice scams
Credential harvesting
Reconnaissance
Hoax
Impersonation
Watering hole attack
Typosquatting
Pretexting
Influence campaigns
-Hybrid warfare
Influence campaigns
-Socail media
Principles (reasons for effectiveness)
-Authority
Principles (reasons for effectiveness)
-Intimidation
Principles (reasons for effectiveness)
-Consensus
Principles (reasons for effectiveness)
-Scarcity
Principles (reasons for effectiveness)
-Familiarity
Principles (reasons for effectiveness)
-Trust