2.4 Common Social-Engineering Attacks, Threats, & Vulnerabilities Flashcards
Social Engineering - Phishing
Imitating someone you may know
Social Engineering - Vishing
Phishing over the phone
Social Engineering - Shoulder surfing
Visually looking at someone else’s device and screen by accident or intentionally
Social Engineering - Whaling
Specifically targeting a high level personal to gain higher level information
Social Engineering - Tailgating
Someone walking in behind someone else with access
Social Engineering - Impersonation
Pretend to be someone else
Social Engineering - Dumpster diving
Obtaining valuable information from the trash can
Social Engineering - Evil twin
Wireless access point with identical characteristics to fool the user
Threats - Distributed denial of service (DDoS)
Use many devices to bring down a service
Threats - Denial of service (DoS)
Takes advantage of a flaw in a system
Threats - Zero-day attack
Vulnerabilities that have not been identified yet
Threats - Spoofing
A person or program identifies as another by falsifying data
Threats - On-path attack
Attacker watches traffic to and from the user
Threats - Brute-force attack
Try every possible password combination
Threats - Dictionary attack
Try every possible password combination using the words found in a dictionary