Social Engineering Flashcards
Manipulates a user into revealing confidential information that are
detrimental to that user or the security of our systems
Social Engineering
A person who works for or with your organization but has ulterior
motives
Insider Threat
An attempt to fraudulently obtain information from a user (usually by
email)
Phishing
An attempt to fraudulently obtain information from a user, usually by
email that targets a specific individual
Spear Phishing
A form of spear phishing that directly targets the CEO, CFO, CIO, CSO, or
other high-value target in an organization
Whaling
Phishing conducted over text messaging (SMS)
Smishing
Phishing conducted over voice and phone calls
Vishing
Phishing attempt to trick a user to access a different
or fake website (usually by modifying hosts file)
Pharming
When a thief attempts to take responsibility for a shipment by diverting
the delivery to a nearby location
DiversionTheft
Attempt at deceiving people into believing that something is false when it
is true (or vice versa)
Hoax
When a person uses direct observation to obtain authentication
information
Shoulder Surfing
When a person uses direct observation to “listen” in to a conversation
Eavesdropping
When a person scavenges for private information in garbage containers
Dumpster Diving
When a malicious individual leaves malware-infected removable media
such as a USB drive or optical disc lying around in plain view
Baiting
When an unauthorized person tags along with an authorized person to
gain entry to a restricted area
Piggybacking