the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.
Baiting
1 of 6
the practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
Phishing
2 of 6
a social engineering technique in which a fictional situation is created for the purpose of obtaining personal and sensitive information from an unsuspecting individual.
Pretexting
3 of 6
mutual consideration they passes between two parties to a contractual agreement
Quid Pro Quo
4 of 6
gaining access to a restricted communications channel by using the session another user already establishing.
Tailgating/Piggy Backing
5 of 6
a type of social engineering technique used to obtain information such as personal identification numbers
Shouldering/Shoulder Surfing
6 of 6
Other cards in this set
Card 2
Front
the practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
Back
Phishing
Card 3
Front
a social engineering technique in which a fictional situation is created for the purpose of obtaining personal and sensitive information from an unsuspecting individual.
Back
Card 4
Front
mutual consideration they passes between two parties to a contractual agreement
Back
Card 5
Front
gaining access to a restricted communications channel by using the session another user already establishing.
Comments
Report