Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
Phishing |
Phishing elicits secure information through an e-mail message that appears to come from a legitimate source such as a service provider or financial institution. |
|
Malvertising |
This is the act of incorporating malicious ads on trusted websites, which results in users’ browsers being inadvertently redirected to sites hosting malware. |
|
Phone scams |
It is not uncommon for someone to call up an employee and attempt toonvince employees to divulge information about themselves or others within the organization. |
|
Spear phishing |
This is a targeted phishing attack that presents as an email message tailored for a specific individual or organization. |
|
Whaling |
whaling uses the concept of targeted emails; however, it increases the profile of the target. The target of a whaling attack is often one or more of the top executives of an organization. |
|
Pharming |
Whereas phishing entices the victim to a malicious website, pharming lures victims by compromising domain name services. When victims attempt to visit a legitimate website, the compromised name service instead provides the IP address of a malicious website. |
|
Pretexting |
A hacker calls an individual and lies to them in an attempt to gain access to privileged data. |
|
Vishing |
Vishing uses the same concept as phishing, except that it uses voice and the phone system as its medium instead of email. |
|
Smishing |
Smishing uses the same concept as phishing, except that it uses SMS texting as the medium instead of email. |
|
Spam |
Hackers may use spam email to trick a user into clicking an infected link or downloading an infected file. |
|
Tailgating |
A hacker quickly follows an authorized person into a secure location. |
|
Baiting |
A hacker leaves a malware-infected physical device, such as a USB flash drive, in a public location such as a corporate washroom. The finder of the device loads it onto their computer, unintentionally installing the malware. |
|
Something for something |
A hacker requests personal information from a party in exchange for something like a free gift. |