1.1 Social Engineering Techniques Flashcards
Phishing
Attackers fish for victims using bait. The goal is to manipulate individuals into taking action they otherwise wouldn’t through the use of fraudulent communication.
Smishing
Type of phishing attack occurring through text messages or other messaging services.
Vishing
Type of phishing attack over the phone to trick users into divulging sensitive information or taking certain actions.
Spam
Refers to unsolicited and often irrelevant or inappropriate messages sent over the internet
SPIM
Referring to unwanted and unsolicited messages sent over instant messaging platforms
Spear Phishing
A targeted form of fishing attack in which cybercriminal is tailor their fraudulent messages to a specific individual organization or group.
Dumpster Diving
Refer to the unauthorized retrieval of sensitive information such as documents containing personal or confidential data from discarded materials.
Shoulder Surfing
Is a form of visual hacking where an individual observes or spies on someone’s else sensitive or confidential information by looking over their shoulder often and crowded or public places.
Pharming
A cyber attack that involves the manipulation of the DNS or other methods to redirect users to fraudulent websites. The goal of farming is to deceive users into visiting malicious websites that appear to be legitimate with the intention of stealing sensitive information such as login credentials, personal details, or financial information.
Tailgating/Piggybacking
Referring to an unauthorized person following an authorized individual into a secure area without proper authentication taking advantage of someone else’s legitimate access taking Android to a restricted or secure location.
Eliciting Information
Refers to the active skillfully obtaining a drawing out information from individuals through various communication techniques.
Whaling
Refers to a highly targeted form of fishing attack that specifically targets high profile individuals within an organization.
Perpending
The technique where malicious characters or code are added at the beginning of a legitimate file string or command.
Identity Fraud/Theft
Any type of crime in which an individual’s personal information is stolen and used without their permission for fraudulent activities.
Invoice Scams/Billing Scams/Payment Scams
Are fraudulent schemes in which individuals or businesses receive fake or misleading voices with the goal of tricking them into making payments for goods or services that were never provided.