Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Social Engineering Attacks

10

Flashcards

0/10

Still learning
StarStarStarStar

Watering Hole Attack

StarStarStarStar

Example: Compromising a website frequently visited by the intended victims to distribute malware. Prevention Techniques: Regular security checks on website integrity, using web filters, and keeping software updated.

StarStarStarStar

Tailgating

StarStarStarStar

Example: Attacker follows an authorized person into a restricted area without proper authentication. Prevention Techniques: Security training to prevent unauthorized access, use of keycard access systems, and awareness of surroundings.

StarStarStarStar

Spear Phishing

StarStarStarStar

Example: Targeted email to company executives with fabricated insider information. Prevention Techniques: Advanced email security, personalized training for high-risk individuals, and verification procedures.

StarStarStarStar

Phishing

StarStarStarStar

Example: Fraudulent email impersonating a bank to steal login credentials. Prevention Techniques: Anti-phishing training, vigilant email filtering, and two-factor authentication.

StarStarStarStar

Whaling

StarStarStarStar

Example: Crafted emails targeting high-level executives to authorize fraudulent financial transactions. Prevention Techniques: Executive training, email verification steps, and secure communication protocols.

StarStarStarStar

Smishing

StarStarStarStar

Example: SMS messages that trick individuals into clicking on malicious links or providing confidential info. Prevention Techniques: Educating users about suspicious text messages, installing security apps, and not clicking on links from unknown numbers.

StarStarStarStar

Pretexting

StarStarStarStar

Example: Attacker fabricates a scenario to steal a victim's personal information under false pretenses. Prevention Techniques: Skepticism of unsolicited contacts, verification of caller identity, and not sharing personal information.

StarStarStarStar

Baiting

StarStarStarStar

Example: Offering a free music download that leads to malware installation. Prevention Techniques: Avoiding suspicious offers, using trustworthy antivirus software, and not inserting unknown USB drives.

StarStarStarStar

Vishing

StarStarStarStar

Example: Phone calls impersonating legitimate organizations to extract personal information. Prevention Techniques: Caller identification, skepticism towards unsolicited calls, and not providing sensitive information over the phone.

StarStarStarStar

Quid Pro Quo

StarStarStarStar

Example: Promising IT services in exchange for login credentials. Prevention Techniques: Caution towards unsolicited offers, verifying the identity of service providers, and implementing strict IT support protocols.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.