Part I: Attacks, Threats and Vulnerabilities Flashcards
Domain 1.0: Attacks, Threats and Vulnerablities
The process by which an attacker seeks to extract useful information from users, often by just tricking them into helping the attacker.
1.1 Compare and contrast different types of social engineering technique
Social Engineering
(pg.#)
Chapter 1: Social Engineering Techniques
Domain 1.0: Attacks, Threats and Vulnerablities
1. Following closely behind someone who has authorized physical access in an environment.
2. Involves appearing to be a part of an authorized group or capitalizing on people’s desire to be polite
1.1 Compare and contrast different types of social engineering technique
Tailgating
(pg.#)
Chapter 1: Social Engineering Techniques