Lecture on Phishing Attacks and the Signal Protocol

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

This set of flashcards covers the vocabulary and technical concepts discussed in the lecture, specifically focusing on the types and life cycle of phishing attacks as well as the cryptographic components of the Signal Protocol.

Last updated 2:36 AM on 5/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

22 Terms

1
New cards

Phishing

A form of social engineering masquerading as a trustworthy entity to steal credentials, data, and money by exploiting human trust and cognitive bias.

2
New cards

Deceptive Phishing

The most common form of phishing involving mass emails that impersonate well-known brands to trick users into resetting passwords or accounts.

3
New cards

Spear Phishing

A dangerous, targeted attack where attackers harvest personal information from social media to craft emails appearing to come from a known, trustworthy source.

4
New cards

BEC (Business Email Compromise)

An attack where the sender impersonates a high-authority figure, such as a CEO, to gain information from organization employees.

5
New cards

Smishing

Phishing attacks delivered via SMS text messages, often appearing to come from banks or delivery services to exploit high open rates.

6
New cards

AI Phishing

A type of phishing that utilizes large language models to produce grammatically perfect and personalized messages at scale, eliminating traditional red flags like spelling errors.

7
New cards

Pharming

A technical phishing method that compromises DNS servers to silently redirect users from legitimate websites to fake pages.

8
New cards

Reconnaissance

The preliminary information-gathering phase where cyber attackers survey targeted systems, networks, or personnel to identify vulnerabilities.

9
New cards

Weaponization

The phase of an attack where a perpetrator registers look-alike domains and builds convincing replicas of legitimate sites or emails.

10
New cards

Sender Policy Framework (SPF)

A technical control used to authenticate the sender of an email and block spoofing attempts.

11
New cards

Cantina

A machine learning-based system with an accuracy of 95%95\% that analyzes URL features, page content, and email headings to detect phishing.

12
New cards

Content Watermarking

The practice of embedding invisible digital signatures into website elements (CSS or HTML) to help users or browser extensions verify the legitimacy of a site.

13
New cards

Visual Cryptography

A hybrid prevention framework where time-sensitive images or captchas are split into two shapes to secure user credentials.

14
New cards

Signal Protocol

A non-federated cryptographic protocol that provides end-to-end encryption for voice, video, and instant messaging conversations.

15
New cards

End-to-End Encryption

A security system where messages are encrypted on the sender's device and can only be decrypted by the intended recipient, making them unreadable to the server.

16
New cards

Forward Secrecy

A security property ensuring that past messages remain secure and cannot be decrypted even if future keys are compromised.

17
New cards

Post-Compromise Security

Also known as self-healing, this property ensures that future messages are protected from an adversary who has previously compromised a connection or device.

18
New cards

Extended Triple Diffie-Hellman (X3DH)

A key exchange protocol used for the initial handshake and mutual authentication between two parties to establish a shared secret key, even when one is offline.

19
New cards

Double Ratchet Algorithm

A protocol that updates and refreshes encryption keys for every single message sent or received during a conversation.

20
New cards

Key Derivation Function (KDF)

A cryptographic function that takes a secret key and input data to return output data that replaces the KDF key or serves as an output key.

21
New cards

PQXDH (Post-Quantum Extended Triple Diffie-Hellman)

An additional round of key agreement designed to stand up to quantum attacks during the session initiating handshake.

22
New cards

SPQR (Sparse Post-Quantum Ratchet)

A regularly advancing post-quantum ratchet that provides forward secrecy and post-compromise security in a quantum-safe manner.