Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
Social Engineering Attacks |
11 |
|
Social Engineering Targets |
11 |
|
Spoofing |
Human-based software attack used to conceal identity. Can occur in:
|
|
Impersontation |
Human-based attack where attacker pretends to be someone they're not. Successful in situations where:
|
|
Hoax |
Email or web-based attack |
|
Phishing |
11 |
|
Vishing |
11 |
|
Whaling |
11 |
|
URL Hijacking |
11 |
|
Spam/Spim |
11 |
|
Shoulder Surfing |
11 |
|
Dumpster Diving |
11 |
|
Tailgating |
11 |