Compare and contrast different types of social engineering techniques. Flashcards
SOCIAL ENGINEERING
an attempt by an attacker to convince someone to provide info (like a password) or
perform an action they wouldn’t normally perform (such as clicking on a malicious link)
Social engineers often try to gain access to the IT infrastructure or the physical facility
PHISHING
commonly used to try to trick users into giving up personal information (such as user
accounts and passwords), click a malicious link, or open a malicious attachmen
SPEAR PHISIHING
Targets specific groups of users
WHALING
targets high-level executives
VISHING
voice phishing (phone based)
SMISHING
uses sms(text) messaging on mobile
SPAM
Unsolicited email, generally
considered an irritant
SPIM
SPAM over instant messaging, also
generally considered an irritant
DUMPSTER DIVING
Gathering important details (intelligence) from
things that people have thrown out in their TRASH.
TAILGATING
when an unauthorized individual might
follow you in through that open door
without badging in themselves.
ELICITING INFORMATION
strategic use of casual conversation
to extract information without the
arousing suspicion of the target
SHOULDER SURFING
a criminal practice where thieves
steal your personal data by spying
over your shoulder
PHARMING
an online scam similar to phishing, where
a website’s traffic is manipulated, and
confidential information is stolen.
IDENTITY FRAUD
use of another person’s personal information,
without authorization, to commit a crime or to
deceive or defraud that person or other 3rd party
PRENPENDING
Prepending is adding words or phrases like “SAFE”
to a malicious file or suggesting topics via social
engineering to uncover information of interest.