Social Engineering Flashcards
Studying
The act of manipulating people into performing actions or divulging confidential information.
Social Engineering
A type of malware that denies access to a computer system until a ransom has been paid.
Ransomware
A small focused targeted attack via email on a particular person or organization with the goal of penetrating their defenses is done after research on the target and has a specific personalized component designed to make the target do something against his or her own interest.
Spear Phishing
The process of attempting to acquire sensitive information such as usernames passwords and credit card details by masquerading as a trustworthy entity and using bulk email which tries to evade spam filters emails claiming to be from popular social websites.
Phishing
Software that is specifically designed to disrupt damage or gain unauthorized access to a computer.
Malware
Criminal activities carried out by means of computers or the internet.
Cybercrime
A technique used to gain unauthorized access to computers whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
Spoofing
Is a type of program designed and developed to protect computers from malware like viruses computer worms, spyware, botnets, rootkits, keyloggers and such this function is used to scan, detect, and remove viruses from your computer.
Antivirus Software
Operates more or less independently of other files.
Worm
Is typically a software application or a hardware device that is used to store and manage a person’s passwords and strong passwords typically all stored passwords are encrypted requiring the user to create a master password to access all managed passwords.
Password Manager
Different types of computer files that have different extensions the letters after the dot.
File Types
Taking someone else’s social security number date of birth address and other important personal information to establish false credentials and commit fraud.
Identity Theft
Is a numerical label assigned to each device connected to a computer network.
Internet Protocol Address
In computer science is a rule or pattern that specifies how a certain input sequence often a sequence of characters should be mapped to a replacement output sequence also often a sequence of characters according to a defined procedure.
Macros
A network of computers and smart devices that have been compromised by malware and are under control of a cybercriminal.
Botnet