Gaining confidential or personal information with a motive
social engineering
1 of 7
Seek to obtain personal information, such as names, addresses and social security numbers.
phishing
2 of 7
the hacker offers a service or benefit in exchange for information or access.
Quid pro quo
3 of 7
These types of attacks commonly take the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.
pretexting
4 of 7
may offer users free music or movie downloads, if they surrender their login credentials to a certain site.
baiting
5 of 7
involve someone who lacks the proper authentication following an employee into a restricted area
tailgating
6 of 7
looking over someone's shoulder, to get information
shouldering
7 of 7
Other cards in this set
Card 2
Front
Seek to obtain personal information, such as names, addresses and social security numbers.
Back
phishing
Card 3
Front
the hacker offers a service or benefit in exchange for information or access.
Back
Card 4
Front
These types of attacks commonly take the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.
Back
Card 5
Front
may offer users free music or movie downloads, if they surrender their login credentials to a certain site.
Comments
No comments have yet been made