Domain 1 Flashcards
is the art of exploiting human behavior by convincing someone to reveal information or perform an activity, these attacks can occur in person, via email, and over the phone
Social Engineering
is the act of attempting to gather personal or sensitive information through fraudulent emails. is the most common form of social engineering attack related to computer security
Phishing
is the act of attempting to gather personal or sensitive information through fraudulent SMS (short message services, better known as texting) works primarily due to the use of urgency and intimidation in the message
Smishing
Is the act of attempting to gather personal or sensitive information through fraudulent phone calls, This video demonstrates the use of (***) to steal someone’s cell phone credentials
Vishing
is unwanted commercial emails that are sent out in bulk via email
Spam
SPIM is unwanted commercial emails that are sent out in bulk via instant messages
Spam Over Instant Messaging
is a term created to refer to a phishing attack that targets a specific person or group of people with something in common
Spear Phishing
is the act of attempting to gather personal or sensitive information from trash dumpstersAn attacker may gather a variety of information that can be useful in a social engineering attack10
Dumpster Diving
is the act of secretly observing a person’s computer screen or keyboard to gather personal or sensitive informationThe attacker directly observes the individual entering sensitive information on a form, keypad, or keyboard
Shoulder Surfing
is the act of directing internet users to a malicious website to gather personal or sensitive informatio
Pharming
is the act of following an authorized person into a restricted area without providing credentialsAlso known as piggybacking
Tailgating
Is the act of encouraging a person to disclose personal or sensitive information Calls to or from help desk and tech support units can be used to ____ ______
Eliciting Information
is a type of phishing that targets high-profile individuals such as executivesThe sender must do some upfront research about the target as well as the subject in order to craft an e-mail that sounds convincing
Whaling
The attacker adds a story to the beginning of the message
Prepending
is the act of stealing personal information to impersonate the victim
Identity fraud
The act of sending spoofed invoices from a trusted source or business executive
Invoice Scams
The act of gaining access to a vast number of stored usernames and passwords, enabling an attacker a series of access passes to the system
Credential Harvesting
The act of engaging with a computer system to gather information about its possible weaknesses
Reconnaissance
is a false security threat that’s meant to entice a user to believe it’s real and disclose sensitive or personal information
Hoax
The act of masquerading as a legitimate or trusted individual or entity
Impersonation
The act of infecting a frequently visited website with malware
Watering Hole Attack
also known as URL hijacking) is the act of presenting users with a fake site that has a similar URL
Best defense against this is to register those domains with all deviations of the designated site
Typosquatting
A social engineering tactic where the attacker creates a false scenario to steal the victim’s personal information
An example is an attacker calling to verify personal information with the victim
Pretexting
are an attempt to shift public opinion through the use of social media platforms
Influence Campaign