Social Engineering Flashcards
Phishing
Attackers attempt to deceive people into revealing information or installing malware
Vishing
Voice Phishing
Attackers use the phone to trick victims into giving up sensitive data.
Shoulder Surfing
An attempt to obtain sensitive information like PIN’s and Passwords by looking over someones shoulder as they input.
Whaling Phishing
Attackers attempt to deceive top officials and high-ranking members of an organization into giving up trade secrets or company data.
Spear Phishing
A form of Phishing that targets a specific person for their login credentials or financial information, with malicious intent.
Tailgating
Following someone through access controlled barriers / doors.
Impersonation
An attempt to falsify identity in order to access restricted area’s or information.
Dumpster Diving
The act of rummaging through corporate trash in an attempt to obtain sensitive data that was improperly disposed.
Evil Twin
A fraudulent Wi-Fi access point that is configured to eavesdrop on communications, and mimics a familiar SSID to trick users.