1.1 Flashcards
(32 cards)
What is an attack characterized by the attacker trying to get the victim to click on a link or log-in to an illegitimate website?
PhishingPhishing
What is an attack characterized by the attacker trying to exploit the victim via text message?
Smishing
What is an attack characterized by the attacker trying to exploit the victim via a phone call or What is an attack characterized by the attacker trying to exploit the victim via a phone call or voicemail??
Vishing
An attack that is focused on a large group rather than an individual within the group
Pharming
An attack that is characterized by creating a false URL that is almost identical to a legitimate URL, except it has an extra letter in the beginningPrepending
Prepending
The process of the attacker gathering information about the victim
Reconnaissance
An attack that is characterized by creating a fake URL that is very similar to a legitimate URL, except it has an easy-to-miss misspelling.
Typosquatting
An attack that involves setting up the scenario by lying to the victim
Pretexting
____________ is a common causation of a pharming attack.
Poisoned DNS server
Poisoned DNS server
Caller ID Spoofing
A targeted attack with inside information that makes the attacker more believable.
Spear phishing
An attack characterized by the attacker faking to be someone they aren’t.
Impersonation
The process of an attacker extracting information from the victim.
Eliciting information
An attack where the victim’s identity has been exploited.
Identity fraud
3 types of identity fraud
Credit card fraud
Bank fraud
Loan fraud
An attack characterized by the attacker gaining information about the victim by going through their trash.
Dumpster diving
An attack characterized by the attacker gaining information by looking at the victim’s computer screen without the victim’s knowledge.
Shoulder surfing
A threat that seems real, but isn’t real.
Hoax
A third party location or website that attackers exploit in hopes that their target victims will use the location/website and become infected.
Watering Hole Attack
Unsolicited messages that likely could infect a user if interacted with.
Spam
Spam that is received through a messaging platform.
Spam over instant messaging (SPIM)
The Influence Process
Fake users create content > post to social media > amplify the message > real users see and share the message > Mass media picks up the story and spreads it everywhere
A type of influence campaign that involves changing the way other people think through technology (i.e. cyberwarfare)
Hybrid Warfare
When an unauthorized individual enters a secure area by following someone through a secured door.
Tailgating