Phishing and Social Engineering

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts related to the lecture on Phishing and Social Engineering, aimed at assisting students in understanding and recalling critical information for their exam.

Last updated 7:15 AM on 12/14/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

21 Terms

1
New cards

Phishing

A cyber attack that attempts to trick individuals into providing sensitive information by posing as a trustworthy entity.

2
New cards

Social Engineering

Manipulating individuals into divulging confidential or personal information that may be used for fraudulent purposes.

3
New cards

Wicked Problem

A complex problem that is difficult to define and does not have a clear solution, often requiring educated guesses.

4
New cards

Tame Problem

A problem with a known solution that can be reached through a defined process.

5
New cards

Six Principles of Influence

Cialdini's principles that explain how to persuade others, including Reciprocity, Commitment and Consistency, Social Proof, Authority, Liking, and Scarcity.

6
New cards

Spear Phishing

A targeted phishing attack aimed at a specific individual or organization.

7
New cards

Spoofing

Disguising a communication from an unknown source as being from a known, trusted source.

8
New cards

Vishing

Voice phishing; a voice call that uses social engineering techniques to trick individuals into divulging personal information.

9
New cards

Smishing

SMS phishing; a text message that attempts to lure victims into providing sensitive information.

10
New cards

Urgency and Pressure

Techniques used in social engineering to incite panic or urgency, prompting quick and thoughtless actions from the target.

11
New cards

Compelling Attachments or Links

Attachments or links sent in phishing emails that often contain malicious code and prompt the user to click or download.

12
New cards

AI-generated Phishing Emails

Phishing emails crafted by artificial intelligence that can be highly personalized and context-aware.

13
New cards

IBM 5/5 Rule

A guideline stating it takes 5 prompts and 5 minutes for AI to create a phishing email campaign.

14
New cards

False Positives

Legitimate emails incorrectly classified as phishing emails by security systems.

15
New cards

Piggybacking

A social engineering tactic where an authorized person allows an unauthorized person to follow them into a restricted area.

16
New cards

Tailgating

A technique where an unauthorized person sneaks into a restricted area by closely following an authorized person.

17
New cards

Emotional Appeal

A method used in social engineering where emails or messages tap into a target's emotions, such as fear or greed.

18
New cards

Pretexting

A social engineering tactic where an attacker creates a fabricated scenario (pretext) to trick a target into divulging information or performing an action.

19
New cards

Baiting

A social engineering attack that uses a physical medium (like a USB drive) or an online lure (like a free download) to entice victims to fall for a trap.

20
New cards

Quid Pro Quo

A social engineering attack where the attacker offers something in return for information (e.g., offering IT help for a password).

21
New cards

Shoulder Surfing

Observing someone's private information over their shoulder (e.g., watching them type a PIN or password).