Module 7: Section E Social Engineering
___ filters block mail that originates from IP addresses of known spammers.
Blacklist
___ filters examine the content within a message for certain words or phrases commonly used in spam emails.
Content
Phishing
an email security threat involving online fraud and identity theft
A rogue ___ exploit usually beins with a virus warning and an offer to disinfect the infected device.
antivirus
pretexting
describing spam that uses a false pretext to trick victims into participating
Advance ___ fraud and stranded traveler are two social engineering exploits that are delivered in spam
fee
A spam ___ uses a set of rules to examine email messages and determine which are spam.
filter
Blacklist spam ___ block mail that originates from IP addresses of known spammers
filters
Social Engineering
is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest
Social Engineer
is a judgment-neutral term for a person who devises and carries out a scam in order to accomplish a goal, such as financial gain, unauthorized access, or serve disruption
Many ___attacks use DNS spoofing to send victims to a fraudulent Web sites
pharming
A ___ attack usually begins with a fraudulent email message that appears to be from a legitimate company
phishing or spear phishing
In the context of cyber security, social engineering is a deceptive practice that exploits human ___ by inducing victims to interact with a digital device in a way that is not in their best interest.
psychology
Pharming
redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams
A ___ antivirus exploit displays a fake virus warning
rogue
Many social engineering attacks begin with ___, which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.
spam
spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
spam filter
uses a set of rules to examine email messages and determine which are spam
advance fee fraud
victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn
Some software is not exacly malware, but it is a nuisance. A(n) ___ (hint: use the acronym) takes up residence on a digital device and seems impossible to disable or remove.
PUP
___ filters block or allow mail based on the sender's address.
Permission
___ redirects Web site traffic to fraudulent web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams.
Pharming
___ is an email scam that masquerades as a message from a legitimate company or agency of authority, such as the IRS.
Phishing
___ filters review the email header for falsified information, such as spoofed IP addresses.
Header