Section 1 – Attacks, Threats, and Vulnerabilities 1.1 – Social Engineering Flashcards
1.1 – Social Engineering
What is Phishing
1.1 - Social Engineering
The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
1.1 - Social Engineering
What is an impersonation attack
1.1 - Social Engineering
An impersonation attack is a form of fraud in which attackers pose as a known or trusted person to dupe an employee into transferring money to a fraudulent account, sharing sensitive information (such as intellectual property, financial data or payroll information), or revealing login credentials that attackers can used to hack into a company’s computer network.
1.1 - Social Engineering
What is Dumpster Diving
1.1 - Social Engineering
Dumpster diving is the process of searching trash to obtain useful information about a person/business that can later be used for the hacking purpose.
1.1 - Social Engineering
What is Shoulder Surfing
1.1 - Social Engineering
A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information.
1.1 - Social Engineering
What is an Watering Hole Attacks
1.1 - Social Engineering
In a watering hole attack, the attacker compromises a site likely to be visited by a particular target group rather than attacking the target group directly.
1.1 - Social Engineering
What is Spam
1.1 - Social Engineering
Spam is unwanted, unsolicited digital communication sent out in bulk. Spam is annoying, but it’s also a threat.
1.1 - Social Engineering
What is an influence campaign
1.1 - Social Engineering
Influence campaigns are large-scale campaigns that seek to shift public opinion. Such campaigns are usually carried out in bad faith and often seek to push a false narrative.
1.1 - Social Engineering
What is a Hoaxes
1.1 - Social Engineering
A hoax can be an E-mail message distributing false, often disturbing, information designed to trick recipients into passing the same note on to other e-mail users.
1.1 - Social Engineering