social engineering

?
  • Created by: mazzy123
  • Created on: 04-07-18 11:36
Gaining confidential or personal information with a motive
social engineering
1 of 7
Seek to obtain personal information, such as names, addresses and social security numbers.
phishing
2 of 7
the hacker offers a service or benefit in exchange for information or access.
Quid pro quo
3 of 7
These types of attacks commonly take the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.
pretexting
4 of 7
may offer users free music or movie downloads, if they surrender their login credentials to a certain site.
baiting
5 of 7
involve someone who lacks the proper authentication following an employee into a restricted area
tailgating
6 of 7
looking over someone's shoulder, to get information
shouldering
7 of 7

Other cards in this set

Card 2

Front

Seek to obtain personal information, such as names, addresses and social security numbers.

Back

phishing

Card 3

Front

the hacker offers a service or benefit in exchange for information or access.

Back

Preview of the front of card 3

Card 4

Front

These types of attacks commonly take the form of a scammer who pretends that they need certain bits of information from their target in order to confirm their identity.

Back

Preview of the front of card 4

Card 5

Front

may offer users free music or movie downloads, if they surrender their login credentials to a certain site.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Systems and Software resources »