Week 3 Flashcards
Social engineering ___________ means to masquerade as a real or fictitious character and then play out the role of that person on a victim.
impersonation
_______ is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Phishing
Instead of asking the user to visit a fraudulent website, ________ automatically redirects the user to the fake site.
Pharming
One type of spear phishing is whaling. Instead of going after the “smaller fish,” _______ targets the “big fish,” namely, wealthy individuals or senior executives within a business who typically would have larger sums of money in a bank account that an attacker could access if the attack is successful.
Whaling
A _______ is a false warning, often contained in an email message claiming to come from the IT department.
Hoaxes
The amount of spam, or unsolicited email, that goes through the Internet continues to escalate.
Spam
Instead of using email to contact the potential victim, a telephone call can be used instead. Known as _________ (voice ________), an attacker calls a victim who, upon answering, hears a recorded message that pretends to be from the user’s bank stating that her credit card has experienced fraudulent activity or that her bank account has had unusual activity.
Vishing
What happens when a user makes a typing error when entering a uniform resource locator (URL) address in a web browser, such as typing goggle.com (a misspelling) or google.net (incorrect domain) instead of the correct google.com? Most often today the user will be directed to a fake look-alike site.
Typo Squatting
In many regions similar types of animals are known to congregate around a pool of water for refreshment.
Watering Hole Attack
Just as some social engineering attacks rely on psychological manipulation, other attacks rely on physical acts.
Physical Procedures
__________ involves digging through trash receptacles to find information that can be useful in an attack.
Dumpster Diving
Organizations can invest tens of thousands of dollars to install specialized doors that only permit access to authorized users who possess a special card or who can enter a specific code.
Tailgating