Mod 2 Common Attacks Flashcards
(23 cards)
Phishing
A technique that uses digital communication to trick people into revealing sensitive data or deploying malicious software.
Business Email Compromise (BEC)
A phishing attack where a threat actor impersonates a known source to make a seemingly legitimate request for information, often with the goal of obtaining a financial advantage.
Spear Phishing
A targeted phishing attack that focuses on a specific user or group of users, often using personalized information to make the attack more believable.
Whaling
A type of spear phishing that specifically targets high-profile individuals, such as company executives, to gain access to sensitive data.
Vishing
A phishing attack that uses voice communication, such as phone calls, to trick users into revealing sensitive information.
Smishing
A phishing attack that uses text messages to trick users into revealing sensitive information.
Malware
Software designed to harm devices or networks.
Virus
Malicious code that infects a device and can cause damage to data and software.
Worm
A type of malware that can self-replicate and spread across systems on its own.
Ransomware
A type of malware that encrypts an organization’s data and demands payment to restore access.
Social Media Phishing
A social engineering attack where a threat actor collects information about their target from social media and then uses that information to launch an attack.
Spyware
Malware that gathers and sells information without consent.
Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables.
Watering Hole Attack
A social engineering attack where a threat actor infects a website that is frequently visited by a specific group of users.
USB Baiting
A social engineering attack where a threat actor leaves a malware-infected USB stick in a location where it is likely to be found and used by an unsuspecting victim.
Physical Social Engineering
A social engineering attack where a threat actor impersonates an employee, customer, or vendor to gain unauthorized access to a physical location.
Authority
A social engineering tactic that exploits people’s tendency to respect and follow authority figures.
Intimidation
A social engineering tactic that uses bullying tactics to persuade and intimidate victims into doing what they are told.
Consensus/Social Proof
A social engineering tactic that uses the principle of social proof to persuade people to do something because they believe that others are doing it.
Scarcity
A social engineering tactic that implies that goods or services are in limited supply to create a sense of urgency.
Familiarity
A social engineering tactic that establishes a fake emotional connection with users that can be exploited.
Trust
A social engineering tactic that establishes an emotional relationship with users over time to gain their trust and personal information.