• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Phishing

Phishing elicits secure information through an e-mail message that appears to come from a legitimate source such as a service provider or financial institution.

Malvertising

This is the act of incorporating malicious ads on trusted websites, which results in users’ browsers being inadvertently redirected to sites hosting malware.

Phone scams

It is not uncommon for someone to call up an employee and attempt toonvince employees to divulge information about themselves or others within the organization.

Spear phishing

This is a targeted phishing attack that presents as an email message tailored for a specific individual or organization.

Whaling

whaling uses the concept of targeted emails; however, it increases the profile of the target. The target of a whaling attack is often one or more of the top executives of an organization.

Pharming

Whereas phishing entices the victim to a malicious website, pharming lures victims by compromising domain name services. When victims attempt to visit a legitimate website, the compromised name service instead provides the IP address of a malicious website.

Pretexting

A hacker calls an individual and lies to them in an attempt to gain access to privileged data.

Vishing

Vishing uses the same concept as phishing, except that it uses voice and the phone system as its medium instead of email.

Smishing

Smishing uses the same concept as phishing, except that it uses SMS texting as the medium instead of email.

Spam

Hackers may use spam email to trick a user into clicking an infected link or downloading an infected file.

Tailgating

A hacker quickly follows an authorized person into a secure location.

Baiting

A hacker leaves a malware-infected physical device, such as a USB flash drive, in a public location such as a corporate washroom. The finder of the device loads it onto their computer, unintentionally installing the malware.

Something for something

A hacker requests personal information from a party in exchange for something like a free gift.