Compare and Contrast Types of Attacks Flashcards

1
Q

Gathering information on an attack by exploiting the weakest part of a security system - aka - people

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sending a false email pretending to be legitimate to steal valuable information from the user.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks that target specific individuals

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attack on a powerful or wealthy individual.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack through a phone or voice communications.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Closely following individuals with keys to get access to secure areas.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Taking on the identity of an individual to get access into the system or communications pool.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Going through a business’s or person’s trash to find thrown away valuable information or possessions.

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

False information that deceives the user into compromising security by making them believe they are at risk.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security attack that targets a specific highly secured group by infecting a commonly visited website by the groups members.

A

Watering hole attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Watching as a person enters information

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly