Social Engineering

Ace your homework & exams now with Quizwiz!

Phishing

-EMAIL attempts which look LEGITIMATE, can be link to website -> makes User reveal Secret Information.

Spear Phishing Attack

-GROUP of people are Phished! Phishing attacks that target large groups of people. the perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will be able to obtain sensitive, personal information

A fraudulent EMAIL requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers)

-Phishing -Social Engineering

Types of Social Engineering

-Phishing -Spear Phising -Whaling -Tailgating -Dumpster Diving -Impersonation -Vishing -Quid pro quo

Whaling

-Phishing targets CEO, high Executives.

Social Engineering

-Tricking People to reveal Confidential Information (Usernames, Password, Bank info, Hospital info..) -can be thru Email, Phone, In person, etc

In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks. T/F

True

Shoulder surfing

Watching an authorized user enter a security code on a keypad.

Phishing scams targeting people holding high positions in an organization or business are known as:

Whaling

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

impersonation

an act of pretending to be another person for the purpose of entertainment or fraud

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

social engineering

What is tailgating?

Gaining unauthorized access to restricted areas by following another person

Which social engineering attack relies on identity theft?

Impersonation

Dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as:

Phishing

Vishing

Phone Phishing

A situation in which an unauthorized person can view someone's display or keyboard to learn their password or other confidential information is referred to as:

Shoulder Surfing

Phishing scams targeting a specific group of people are referred to as:

Spear Phishing


Related study sets

NCLEX PN: Respiratory questions 7th edition

View Set

Chapter 13.9.6 Practice Questions

View Set

Macroeconomics Study Guide- (Ch. 3,6,7,8)

View Set

RE Course Section 5: MI Land Use Controls And Environmental Issues

View Set

Theme 2 (climate and ecosystems) Deforestation

View Set

Chapter 4 Cell Structure Study Set

View Set

Federal Food and Nutrition Assistance Programs

View Set

Geology 1403 Bockoven Final Exam Review

View Set