Social Engineering Flashcards
Type of social engineering in which an in attacker attempts to obtain sensitive information from users by masquerading as a trusted entity in an email or instant message sent to a large group are often random users 
Phishing
Variation of phishing that uses voice communication technology to obtain the information the attacker is seeking

Vishing
Bulk unsolicited email 
Spam
Spam that is delivered over instant messaging 
Spam over Instant messaging (SPIM)
A phishing attack that targets, a specific person, or group of people, with some thing in common 
Spear phishing
The process of going through targets trash in hopes of finding valuable information that might be used in a penetration attempt 
Dumpster diving
The attacker directly observes, the individual entering sensitive information on a form, keypad or keyboard 
Shoulder surfing
Miss directing users to fake websites made to look official. using phishing attackers target individuals one by one by sending out emails. 
Pharming
Simple tactic, of following closely behind a person who has just use their own access card or pin to gain physical access to a room or building 
Tailgating
Use a wide range of psychological techniques to convince people whose main job is to help others to perform tasks, resulting in security compromises. This can include calls to or from helpdesk and tech-support units.
Eliciting information 
The target is a high value person such as a CEO or CFO 
Whaling
The act of adding something else to the beginning of an item. In terms of social engineering, this is the active supplying information that another will act upon frequently before they ask for it, in an attempt to legitimate Mize, the actual request, which comes later

Prepending
The use of fake credentials to achieve an end 
Identify fraud
Use a fake invoice in an attempt to get a company to pay for things that has not order. 
Invoice scam
The collection of credential information such as user IDs passwords, and so on enabling an attacker a series of access passes to the system 
Credential harvesting