Social Engineering Attacks: Phishing, Tailgating, Piggybacking, Shoulder Surfing, Eavesdropping, Dumpster Diving

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering the key social engineering attacks and their basic definitions as discussed in the lesson.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Social engineering

Any attempt to manipulate people into revealing confidential information or performing actions that compromise security; focuses on exploiting the human element to bypass technical controls.

2
New cards

Phishing

An attack that uses email to trick users into clicking a link and entering credentials or other sensitive data on a spoofed page.

3
New cards

Spear phishing

A targeted phishing attack aimed at specific individuals or groups, using personalized information to appear legitimate.

4
New cards

Whaling

A form of spear phishing that targets high-level executives (e.g., CEO, CFO, CIO) within an organization.

5
New cards

Tailgating

An attacker follows an authorized person into a secure area by slipping in behind them without their knowledge or consent.

6
New cards

Piggybacking

Similar to tailgating, but occurs with the employee's knowledge or consent; the attacker enters on one swipe because the employee held the door open.

7
New cards

Shoulder surfing

An attacker observes someone entering authentication information by looking over their shoulder or nearby, to capture passwords or other data.

8
New cards

Eavesdropping

Listening in on conversations to obtain confidential information, such as projections or other sensitive data.

9
New cards

Dumpster diving

Searching through trash or recycling for personal or confidential information to misuse for an attack.