1.1 Compare and contrast different types of social engineering techniques Flashcards
(30 cards)
1
Q
Phishing
A
An attempt to fraudulently obtain information from a user
2
Q
Smishing
A
Phishing conducted over text messages (SMS)
3
Q
Vishing
A
4
Q
Spam
A
5
Q
Spam over instant messaging (SPIM)
A
6
Q
Spear phishing
A
7
Q
Dumpster diving
A
8
Q
Shoulder surfing
A
9
Q
Pharming
A
10
Q
Tailgating
A
11
Q
Eliciting information
A
12
Q
Whaling
A
13
Q
Prepending
A
14
Q
Identity fraud
A
15
Q
Invoice scams
A
16
Q
Credential harvesting
A
17
Q
Reconnaissance
A
18
Q
Hoax
A
19
Q
Impersonation
A
20
Q
Watering hole attack
A
21
Q
Typosquatting
A
22
Q
Pretexting
A
23
Q
Influence campaigns
-Hybrid warfare
A
24
Q
Influence campaigns
-Socail media
A
25
Principles (reasons for effectiveness)
-Authority
26
Principles (reasons for effectiveness)
-Intimidation
27
Principles (reasons for effectiveness)
-Consensus
28
Principles (reasons for effectiveness)
-Scarcity
29
Principles (reasons for effectiveness)
-Familiarity
30
Principles (reasons for effectiveness)
-Trust