Explore tens of thousands of sets crafted by our community.
Social Engineering Attacks
10
Flashcards
0/10
Watering Hole Attack
Example: Compromising a website frequently visited by the intended victims to distribute malware. Prevention Techniques: Regular security checks on website integrity, using web filters, and keeping software updated.
Tailgating
Example: Attacker follows an authorized person into a restricted area without proper authentication. Prevention Techniques: Security training to prevent unauthorized access, use of keycard access systems, and awareness of surroundings.
Spear Phishing
Example: Targeted email to company executives with fabricated insider information. Prevention Techniques: Advanced email security, personalized training for high-risk individuals, and verification procedures.
Phishing
Example: Fraudulent email impersonating a bank to steal login credentials. Prevention Techniques: Anti-phishing training, vigilant email filtering, and two-factor authentication.
Whaling
Example: Crafted emails targeting high-level executives to authorize fraudulent financial transactions. Prevention Techniques: Executive training, email verification steps, and secure communication protocols.
Smishing
Example: SMS messages that trick individuals into clicking on malicious links or providing confidential info. Prevention Techniques: Educating users about suspicious text messages, installing security apps, and not clicking on links from unknown numbers.
Pretexting
Example: Attacker fabricates a scenario to steal a victim's personal information under false pretenses. Prevention Techniques: Skepticism of unsolicited contacts, verification of caller identity, and not sharing personal information.
Baiting
Example: Offering a free music download that leads to malware installation. Prevention Techniques: Avoiding suspicious offers, using trustworthy antivirus software, and not inserting unknown USB drives.
Vishing
Example: Phone calls impersonating legitimate organizations to extract personal information. Prevention Techniques: Caller identification, skepticism towards unsolicited calls, and not providing sensitive information over the phone.
Quid Pro Quo
Example: Promising IT services in exchange for login credentials. Prevention Techniques: Caution towards unsolicited offers, verifying the identity of service providers, and implementing strict IT support protocols.
© Hypatia.Tech. 2024 All rights reserved.