Exam9 Flashcards
The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link a malicious version of spam.
Phishing
Uses the phone system to trick users into giving up personal and financial information. Often uses VoIP to make it look like the call is coming from a real company
Vishing
A form of phishing that uses SMS instead of email. some attacks include malicious attachments and some try to convince a user to give up personal information.
Smishing
Unwanted or unsolicited email. some is harmless advertisements while some is malicious including malicious links, code, or attachments.
Spam
Unwanted messages sent over instant messaging (IM) channels. bypasses typical antivirus and spam filters.
Spam over internet messaging (SPIM)
A targeted form of phishing targeting a specific group of users or even one specific user. May attack employees within a company or customers of a company.
Spear Phishing
The practice of searching through trash or recycling containers to gain information from discarded documents.
Dumpster Diving
looking over the shoulder of someone to gain unauthorized information by casual observation
Shoulder Surfing
an attack that manipulates the DNS name resolution process. either tries to corrupt the DNS server or the DNS client.
Pharming
The practice of one person following closely behind another without showing credentials
Tailgating
The act of getting information without asking for it directly. techniques include active listening, reflective questioning, false statements, and bracketing.
Eliciting Information
A form of spear phishing that targets high level executives. Can target high level executives or impersonate high level executives to send messages to high level employees.
Whaling
Used offensively by attackers to attempt to get a user to open a malicious email. Examples of prepending emails can be starting the subject with [SAFE] or [URGENT]
Prepending
When someone steals personal information and uses it for fraudulent activity like opening bank accounts, falsifying tax returns, or applying for loans
Identity Fraud
Attempting to trick people or organizations into paying for services that they did not order and probably did not receive
Invoice Scams
Any attempt to recover usernames and passwords from a user. This can be done via shoulder surfing, phishing or other means.
Credential Harvesting
Gathering as much information as possible on a target, usually thought open source sources
Reconnaissance
A message, often circulated via email, which tells of impending doom from a virus or other security threat that simply doesn’t exist.
Hoax
Pretending to be someone with a certain level of authority in order to obtain access or information
Impersonation
Attempts to discover which websites a group of people are likely to visit and then infects those websites with malware that can infect the visitors
Watering Hole Attack
Also called URL hijacking, relies on mistakes, such as typos made by users inputting a website address into a web browser. When a user enters an incorrect website address, the squatter may lead them to any URL
Typo Squatting
A fictitious scenario added to a conversation to make a request more believeable
Pretexting
User a variety of sources to influence public perception such as hybrid warfare and social media
Influence Campaigns
A military strategy that blends conventional warfare with unconventional methods to influence people. Today a popular method uses social media
Hybrid Warfare