Social Engineering

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Phishing

a broad term used to describe the fraudulent acquisition of information, often focused on credentials like usernames and passwords, as well as sensitive personal information like credit card numbers and related data

2
New cards

Vishing

is phishing accomplished via voice or voicemail messages

3
New cards

Smishing

relies on text messages as part of the phishing scam

4
New cards

Misinformation

is incorrect information, often resulting from getting facts wrong

5
New cards

Disinformation

is incorrect, inaccurate, or outright false information that is intentionally provided to serve an individual or organization’s goals

6
New cards

Impersonation

Pretending to be someone else

7
New cards

Business Email Compromise

Relies on using legitimate email addresses to conduct scams and other attacks

8
New cards

Pretexting

is the process of using a made-up scenario to justify why you are approaching an individual

9
New cards

Watering Hole Attacks

use websites that targets frequent to attack them

10
New cards

Brand Impersonation

Uses emails that are intended to appear to be from a legitimate brand, relying on name recognition and even using email templates used by the brand itself

11
New cards

Typosquatting

Rely on the fact that people will mistype URLs and end up on their sites, thus driving ad traffic or even sometimes using the typo-based website to drive sales of similar but not legitimate products

12
New cards

Pharming

relies either on changing a system’s hosts file (which is the first reference a system checks when looking up DNS entries) or on active malware on the system that changes the system’s DNS servers. A successful pharming attack using a hosts-file-based technique will modify a hosts file and redirect unsuspecting victims to a lookalike site.