1.1: Compare and contrast different types of social engineering techniques. Flashcards
An attack exploiting human nature and behavior.
Social Engineering
Social engineering, employed to obtain sensitive/private information. Can be any communication means.
Phishing
Phishing occurring over std. text msg service/app
Smishing (SMS phishing)
Phishing done via voice communication system. Includes traditional phone lines, VoIP, and mobile devices.
Vishing
Any type of email unsolicited and/or undesired
Spam
Unwanted communications over a messaging system via internet.
Spam over instant messaging (SPIM)
More targeted form of phishing where message is crafted and directed to a specific group of individuals
Spear phishing
Digging through trash/discarded materials for information on a target
Dumpster diving
When someone is able to watch another user’s display/keyboard
Shoulder surfing
Malicious redirection of a valid URL or IP to a fake website hosting a false version of the original destination.
Pharming
When an unauthorized person enters a facility under authorization of a valid member w/o their knowledge
Tailgating
Activity of gathering info from systems or people
Eliciting information
Form of spear phishing, targeting high-value individuals (CEO, etc.)
Whaling
Where malicious characters or code are added at the beginning of a legitimate file, string, or command.
Prepending
Act of stealing ones identity. Can refer to initial act of info gathering or when stolen info is used to take one’s account.
Identity fraud