Phishing Flashcards

1
Q

Stealing info from ppl
Ex: Fake page made to look like real page
Must check url for validation

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

URL hijacking similar but not the same
Ex: messor.com/messer.com

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lying to get info
Ex: pretending to be visa or bank

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To attacking a group by taking over or hacking website to gain info from all visitors

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To attack by phone or voice

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To attack by text
Ex: sending a link

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To be an actor, to become personal

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extract information from victim by phone text Email etc

A

Eliciting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your identity being used by others to buy or do things

A

Identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Looking for personal info in trash

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the us it’s legal unless local restrictions
if it’s In the trash it’s open season

A

Is dumpster diving legal?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Looking over shoulder to get info.

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A threat that doesn’t exist but seem real

A

Computer hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To check if hoax is real or fake

A

Dehoaxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A fake third party website or network to gain info from users or visitors to gain access to original network.

A

Watering hole attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defense in depth layered defense it’s never one thing

Firewall in IBS stop the traffic

Anti Virus and anti malware

A

Protection from watering hole attacks

17
Q

Unsolicited messages
Ex:ads, unwanted

A

Spam

18
Q

Spam over instant message

A

Spim