Phishing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Phishing

the use of digital communications to trick people into revealing sensitive data or deploying malicious software

2
New cards

Phishing Kit

a collection of software tools needed to launch a phishing campaign

3
New cards

Smishing

the use of text messages to obtain sensitive information or to impersonate a known source

4
New cards

Vishing

the exploitation of electronic voice communication to obtain sensitive information or impersonate a known source

5
New cards

Spear Phishing

a subset of email phishing in which specific people are purposefully targeted, such as the accountants of a small business.

6
New cards

Whaling

a category of spear phishing attempts that are aimed at high-ranking executives in an organization.

7
New cards

BlueSnarfing

exploiting bluetooth devices by establishing an unauthorized connection and retrieving sensitive information from them.

8
New cards

Pharming

redirecting requests to fraudulent websites via DNS spoofing

9
New cards

Watering hole attack

when attackers target a specific group and exploits websites that the group commonly visits by injecting malicious code, users that visit the website will be automatically infected without their knowledge

10
New cards

Pretexting

creating a fake scenario to elicit sensitive information from victims

11
New cards

Prepending

when an attacker manipulates the caller ID to make it seem as if its calling from a trusted entity

12
New cards

Rootkit

a type of malicious software that is installed by attackers to provide persistent and stealthy access to a system, they are used to manipulate system functions, files, intercept network traffic

13
New cards

Fileless virus

malware that resides and executes within a system’s memory that does not leave a trace behind

14
New cards

Cryptomalware

malicious software that is used to encrypt files on a user’s system, until a ransom is paid to the attacked.

15
New cards

Spyware

malicious software that is used to gather information from a user’s device without their knowledge or consent