Chapter 07: Pervasive Attack Surfaces and Controls

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts from Chapter 07 related to social engineering attacks, physical defenses, and data security measures.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Social Engineering

A means of eliciting information or convincing a user to take action that weakens security, often through deception.

2
New cards

Phishing

An attack method involving sending a fraudulent email to trick the user into providing sensitive information.

3
New cards

Human Vectors

Individuals who are exploited during social engineering attacks to breach security.

4
New cards

Misinformation

False or inaccurate information, often disseminated without malicious intent.

5
New cards

Pharming

A type of redirection attack where the user is directed to a fake website.

6
New cards

Dumpster Diving

Searching through trash to find useful information to aid in a social engineering attack.

7
New cards

Faraday Cage

A structure that blocks electromagnetic fields to protect sensitive data from interception.

8
New cards

Data Minimization

A principle of limiting data collection to only what is necessary for a specified purpose.

9
New cards

Two-Person Integrity

A security control that requires two personnel to be present for higher security measures.

10
New cards

Critical Data

Data that must be rigorously protected due to its crucial importance for business operations.