Social Engineering Flashcards
What is phishing?
Phishing is a cyber attack method where attackers use deceptive emails or messages to trick individuals into revealing sensitive information, such as passwords or financial details.
What is a cyber attack method where attackers use deceptive emails or messages to trick individuals into revealing sensitive information, such as passwords or financial details.
Phishing
Smishing
Smishing is a form of phishing that involves using SMS or text messages to deceive individuals into disclosing personal information or clicking on malicious links.
Vishing
Vishing, or voice phishing, is a social engineering attack that uses phone calls to trick individuals into providing confidential information or performing actions detrimental to security.
What is a form of phishing that involves using SMS or text messages to deceive individuals into disclosing personal information or clicking on malicious links.
Smishing
What is a social engineering attack that uses phone calls to trick individuals into providing confidential information or performing actions detrimental to security.
Vishing
Spam
Spam refers to unwanted and unsolicited electronic messages, often in the form of emails, sent to a large number of users for advertising or malicious purposes.
What refers to unwanted and unsolicited electronic messages, often in the form of emails, sent to a large number of users for advertising or malicious purposes.
spam
SPIM
Spam over instant messaging. SPIM is the unsolicited distribution of messages over instant messaging platforms, similar to email spam but delivered through instant messaging services.
What is the unsolicited distribution of messages over instant messaging platforms, similar to email spam but delivered through instant messaging services.
Spim
Spear phishing
Spear phishing is a targeted phishing attack where cybercriminals customize deceptive messages to a specific individual or organization, increasing the likelihood of success.
What is a targeted phishing attack where cybercriminals customize deceptive messages to a specific individual or organization, increasing the likelihood of success.
Spear phishing
Dumpster diving
Dumpster diving is a physical security attack where attackers search through discarded materials, such as trash bins or recycling, to find sensitive information.
What is a physical security attack where attackers search through discarded materials, such as trash bins or recycling, to find sensitive information.
Dumpster diving
Shoulder surfing
Shoulder surfing is a type of security threat where an attacker observes a user’s sensitive information, such as passwords or PINs, by looking over their shoulder.
What is a type of security threat where an attacker observes a user’s sensitive information, such as passwords or PINs, by looking over their shoulder.
Shoulder surfing
Pharming
Pharming is a cyber attack that redirects website traffic to a fraudulent site, often without the user’s knowledge, to harvest sensitive information.
What is a cyber attack that redirects website traffic to a fraudulent site, often without the user’s knowledge, to harvest sensitive information.
Pharming
Tailgating
Tailgating occurs when an unauthorized person follows an authorized individual into a secure area, taking advantage of the momentary lapse in security.
What occurs when an unauthorized person follows an authorized individual into a secure area, taking advantage of the momentary lapse in security.
Tailgating
Eliciting information
Eliciting information is the practice of extracting sensitive or confidential details from individuals through conversation or manipulation.