Module 7: Section E Social Engineering

Ace your homework & exams now with Quizwiz!

___ filters block mail that originates from IP addresses of known spammers.

Blacklist

___ filters examine the content within a message for certain words or phrases commonly used in spam emails.

Content

Phishing

an email security threat involving online fraud and identity theft

A rogue ___ exploit usually beins with a virus warning and an offer to disinfect the infected device.

antivirus

pretexting

describing spam that uses a false pretext to trick victims into participating

Advance ___ fraud and stranded traveler are two social engineering exploits that are delivered in spam

fee

A spam ___ uses a set of rules to examine email messages and determine which are spam.

filter

Blacklist spam ___ block mail that originates from IP addresses of known spammers

filters

Social Engineering

is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest

Social Engineer

is a judgment-neutral term for a person who devises and carries out a scam in order to accomplish a goal, such as financial gain, unauthorized access, or serve disruption

Many ___attacks use DNS spoofing to send victims to a fraudulent Web sites

pharming

A ___ attack usually begins with a fraudulent email message that appears to be from a legitimate company

phishing or spear phishing

In the context of cyber security, social engineering is a deceptive practice that exploits human ___ by inducing victims to interact with a digital device in a way that is not in their best interest.

psychology

Pharming

redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams

A ___ antivirus exploit displays a fake virus warning

rogue

Many social engineering attacks begin with ___, which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.

spam

spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

spam filter

uses a set of rules to examine email messages and determine which are spam

advance fee fraud

victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn

Some software is not exacly malware, but it is a nuisance. A(n) ___ (hint: use the acronym) takes up residence on a digital device and seems impossible to disable or remove.

PUP

___ filters block or allow mail based on the sender's address.

Permission

___ redirects Web site traffic to fraudulent web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams.

Pharming

___ is an email scam that masquerades as a message from a legitimate company or agency of authority, such as the IRS.

Phishing

___ filters review the email header for falsified information, such as spoofed IP addresses.

Header


Related study sets

Chapter 3: Colonial Ways of Life

View Set

abeka vocabulary spelling poetry V quiz 2A

View Set

Science//Respiration//Photosynthesis

View Set

Chapter 4: Human Digestion, Absorption, and Transport

View Set