ITEC 100 - WEEK 5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

can be anything

that can take advantage

of a vulnerability to

breach security and

negatively alter, erase,

harm object or objects

of interest.

Threat

2
New cards

is an information

security threat that involves

an attempt to obtain,

alter, destroy, remove,

implant or reveal information

without authorized

access or permission.

attack

3
New cards

is a social

engineering attack that tricks

users into revealing sensitive

information, such as

usernames and passwords,

through deceptive emails,

texts, or messages, often

containing malicious

attachments or links that

steal data.

Phishing Attack

4
New cards

use fake domains or deceptive sender names

to steal credentials or install malware.

Email Phishing

5
New cards

involves attackers impersonating executives

via email to request money transfers or document reviews.

Whaling

6
New cards

is a phishing attack via text messages, tricking users into

clicking malicious links that install malware.

Smishing

7
New cards

or voice phishing, uses phone calls to trick victims into

revealing sensitive information, often by impersonating authorities.

Vishing

8
New cards

exploits social media notifications or messages to

deceive users into taking harmful actions.

Angler phishing

9
New cards

Cybercriminals now use HTTPS links in phishing attacks to

appear legitimate.

HTTPS Phishing

10
New cards

targets specific individuals or organizations with

deceptive messages that appear trusted, tricking them into

revealing sensitive information or compromising their devices.

Spear phishing

11
New cards

hijack DNS servers to redirect users to

fraudulent websites that mimic legitimate ones.

Pharming attacks

12
New cards

Attackers exploit website pop-ups to inject malicious code,

tricking users into installing malware by allowing notifications.

Pop-up Phishing

13
New cards

mimics legitimate emails, replacing attachments

or links with malware while appearing to come from a trusted

sender.

Clone phishing

14
New cards

attack uses a fake Wi-Fi hotspot to steal login

credentials through man-in-the-middle tactics.

evil twin

15
New cards

infects websites commonly visited by a

specific group of end-users to compromise their devices and

gain network access.

Watering Whole Phishing

16
New cards

If a member of

senior management has not been in

contact before, be careful to take

the action that is requested.

Abnormal Requests:

17
New cards

Attackers might seem real, but make

sure you double-check and confirm

from senior management before

making any financial transactions.

Confirm before any action:

18
New cards

Text requiring the

recipient to take action to change the

delivery will include a link, so always

search the email or go directly to the

delivery service's website to check the

status.

Change delivery status:

19
New cards

Review the prefix and

compare it to your contact list before

replying to a text message or taking the

suggested action.

Abnormal prefix:

20
New cards

The number may be from

an unusual location or may be blocked.

Call Number:

21
New cards

The call requested

personal information which would seem

unusual for this type of caller.

Action Required:

22
New cards

Be careful with

notifications indicating additions to

posts as they can include links that

direct recipients to malicious websites.

Notifications:

23
New cards

Beware of direct messages from people who

rarely use this feature as accounts can

be faked or fraudulently re-created.

Abnormal direct messages:

24
New cards

are an

emerging kind of threat that target

software developers and suppliers.

The goal is to access source codes,

build processes, or update

mechanisms by infecting

legitimate apps to distribute

malware.

Supply chain attacks

25
New cards

is a cyberattack where attackers impersonate

a trusted executive, employee, or business

partner to deceive organizations into

transferring money or sensitive data.

Business Email Compromise (BEC)

26
New cards

An executive or employee's email account is

hacked and used to request invoice payments to vendors listed in their

email contacts. Payments are then sent to fraudulent bank accounts.

Account Compromise

27
New cards

Attackers pretend to be a lawyer or

someone from the law firm supposedly in charge of crucial and

confidential matters. Normally, such bogus requests are done through

email or phone, and during the end of the business day.

Attorney Impersonation

28
New cards

Employees under HR and bookkeeping are targeted to

obtain personally identifiable information (PII) or tax statements of

employees and executives. Such data can be used for future attacks.

Data Theft

29
New cards

it is where attackers impersonate a company's CEO or

executive to trick employees into making unauthorized wire transfers or

sharing sensitive information.

CEO Fraud

30
New cards

it is a fraud tactic where attackers pose as

suppliers or vendors, sending fake invoices to businesses to deceive

them into making payments to fraudulent accounts.

Bogus Invoice Scheme