1.1 Compare and contrast different types of social engineering tecchniques Flashcards
The process of attempting to obtain sensitive information in electronic communications.
Phishing
A social engineering attack that occurs over or through text messaging services.
Smishing
Phishing done over any telephony or voice communication system.
Vishing
Any type of email that is undesirable and/or unsolicited.
Spam
The transmission of unwanted communications over any messaging system that is supported by or occurs over the Internet.
Spim
A more targeted form of phishing where the message is crafted and directed specifically to an individual or group of individuals.
Spear Phishing
The act of digging through trash to obtain information about a target organization or individual.
Dumpster Diving
The observation of another users keyboard or viewing another users display.
Shoulder Surfing
The malicious redirection of a valid website’s URL or IP address to a fake website that hosts a false version of the original valid site.
Pharming
When an unauthorized entity gains access to a facility under the authorization of a valid worker but without their knowledge.
Tailgaiting
The activity of gathering or collection information from systems or people.
Eliciting Information
A form of spear phishing that targets specific high-value individuals, such as the CEO or other C-level executives, administrators, or high-net worth clients.
Whaling
The adding of a term, expression, or phrase to the beginning or header of some other communication.
Prepending
When you falsely claim to be someone else through the use of stolen information from the victim.
Identity Fraud
A social engineering attack that attempts to steal funds from an organization or individuals through the presentation of a false invoice often followed by strong inducements to pay.
Invoice Scams