Unit 5 - Module 4 - Theats Flashcards
What do you call a manipulation technque that exploits human error to gain private information, access , or valuables?
Social Engineering
These are the stages or what?
1) Prepare
2) Establish Trust
3) Use persuasion tactics
4) Disconnect from the target ( Dissapear after wards )
Stages of __________
Social Engineering
What social engineering tactic temps people into compromising their security?
Baiting
What digital communications trick people into revealing sensitive data or deploying malicious software?
Phishing
What is a type of bait used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money?
Quid pro quo
What social engineering tact is used which unauthorized people follow an authorized person into a restricted area?
Tailgating
What type of attack is when a threat actor compromises a website frequently visited by a specific group of users?
Watering Hole
What do you call the use of digital communications to trick people into revealing sensitive data or deploying malicous software?
Phishing
What do you call the exploitation of electronic voice communication to obtain sensitive information or impersonate a known source?
Vishing
What do you call a subnet of email phising in which specific people are purposefully targeted, such as the accountants of a small business?
Spear Phishing
What do you call the spear phishing attempts that are aimed at high-ranking executives in an organization?
Whaling
What do you call the technique where attackers impersonate customer service reps on social media?
Angler Phishing
What malware is used to gather and sell information without consent?
Spyware
What do you call malicious code written to interfere with computer operations and cause damage to data and software?
Virus
What malware can duplicated and spread itself across systems on its own?
Worm