Hacking Techniques - Social Engineering

Description

GCSE Computing Mind Map on Hacking Techniques - Social Engineering, created by Elissa Hill on 20/02/2018.
Elissa Hill
Mind Map by Elissa Hill, updated more than 1 year ago
Elissa Hill
Created by Elissa Hill about 7 years ago
33
0
1 2 3 4 5 (1)

Resource summary

Hacking Techniques - Social Engineering
  1. Pharming
    1. Malicious code is installed on a personal computer or server
      1. Misdirects users to fraudulent web sites without their knowledge or consent
        1. A computer with a compromised host file will go to the fake Web site even if a user types in the correct internet address
        2. Blagging/pre-texting
          1. Creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances
            1. Like calling a credit card company as a spouse's and asking to change account details
            2. Shoulder surfing
              1. Looking over someone's shoulder when they are entering a passwod
              2. Baiting scenarios
                1. Similar to phishing
                  1. A promise of an item or good that hackers use to attract victims
                    1. May offer users free music or movie downloads, if they surrender their login credentials to a certain site
                    2. Tailgating
                      1. Unauthorized person follows an authorized person to enter a secured premise
                      2. Quid-pro-quo
                        1. Hacker offers a service or benefit in exchange for information or access
                          1. Something for something
                          2. Hoax viruses
                            1. Message warning the recipients of a non-existent computer virus threat
                              1. Message is usually a chain e-mail that tells the recipients to forward it to everyone they know
                              Show full summary Hide full summary

                              0 comments

                              There are no comments, be the first and leave one below:

                              Similar

                              Input Devices
                              Jess Peason
                              Output Devices
                              Jess Peason
                              Computing
                              Kwame Oteng-Adusei
                              Pack of playing cards answer
                              Karl Taylor
                              Code Challenge Flow Chart
                              Charlotte Hilton
                              Computing Hardware - CPU and Memory
                              ollietablet123
                              Computer Systems
                              lisawinkler10
                              Computer science quiz
                              Ryan Barton
                              Input, output and storage devices
                              Mr A Esch
                              GCSE Computing - 4 - Representation of data in computer systems
                              lilymate