Social Enginnering

?
Social Enginnering
The use of deception to manipulate individuals into giving over confidential or personal information that may be used for fraud
1 of 18
Piggybacking
when a person tags along with another person who is authorized to gain entry into a restricted area.
2 of 18
Tailgating
an unauthorized person who follows someone to a restricted area without the consent of the authorized person.
3 of 18
Adware
Advertising software: shows banners or pop-ups when online
4 of 18
Bot
Web robot that gains control over your computer
5 of 18
Bug
A mistake or error in a software program
6 of 18
Ransomware
Blocks all access to a system until money is paid
7 of 18
Rootkit
Software tools allows access to your computer without being detected
8 of 18
Trojan Horse
any malicious computer program which misleads users of its true content
9 of 18
Virus
Code copies itself to corrupt a system or to destroy data
10 of 18
Worm
Finds its way across computers leaving a copy in the memory of each other
11 of 18
Spyware
Collects personal data/ monitors browsing activity
12 of 18
Blagging
the act of creating and using an fake scenario to engage a targeted victim
13 of 18
Pharming
a scam in which malicious code is installed which redirects the user to a fake website
14 of 18
Phishing
an individual or group of individuals who scam users by sending fake emails or websites
15 of 18
Shouldering
is used to obtain information such as pins, passwords and other confidential data by looking over the victim's shoulder
16 of 18
Hacking
an attempt to exploit a computer system or a private network inside a computer
17 of 18
Scamming
an individual, group, or company that attempts to obtain money or something else of value
18 of 18

Other cards in this set

Card 2

Front

Piggybacking

Back

when a person tags along with another person who is authorized to gain entry into a restricted area.

Card 3

Front

Tailgating

Back

Preview of the front of card 3

Card 4

Front

Adware

Back

Preview of the front of card 4

Card 5

Front

Bot

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Social Engineering resources »