1.4.2 identifying data attacks Flashcards
what is social engineering
when you manipulate a victim in order to gain control over a computer system or to steal personal or financial information.
three types of social engineering
blagging
phishing
shouldering
what is blagging
on the phone and someone just gives you the personal information.
what is phishing
where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
what is shouldering
when a person is looking over at a persons computer in attempt to watch them type sensitive info
What is an acceptable use policy?
it is a form that people have to sign if they accept the rules that the company has on what you are allowed to do on their computers/devices.
what is penetration testing
where a company get a person to use their hacking skills to try and get their information.
What are network forensics
It is where you monitor any suspicious activity that you can see on a network.