Compare and Contrast Types of Attacks Flashcards
Gathering information on an attack by exploiting the weakest part of a security system - aka - people
Social engineering
Sending a false email pretending to be legitimate to steal valuable information from the user.
Phishing
Attacks that target specific individuals
Spear phishing
An attack on a powerful or wealthy individual.
Whaling
An attack through a phone or voice communications.
Vishing
Closely following individuals with keys to get access to secure areas.
Tailgating
Taking on the identity of an individual to get access into the system or communications pool.
Impersonation
Going through a business’s or person’s trash to find thrown away valuable information or possessions.
Dumpster diving
False information that deceives the user into compromising security by making them believe they are at risk.
Hoax
A security attack that targets a specific highly secured group by infecting a commonly visited website by the groups members.
Watering hole attack
Watching as a person enters information
Shoulder surfing