Hacking Techniques - Social Engineering

Description

GCSE Computing Mind Map on Hacking Techniques - Social Engineering, created by Elissa Hill on 20/02/2018.
Elissa Hill
Mind Map by Elissa Hill, updated more than 1 year ago
Elissa Hill
Created by Elissa Hill almost 7 years ago
31
0

Resource summary

Hacking Techniques - Social Engineering
  1. Pharming
    1. Malicious code is installed on a personal computer or server
      1. Misdirects users to fraudulent web sites without their knowledge or consent
        1. A computer with a compromised host file will go to the fake Web site even if a user types in the correct internet address
        2. Blagging/pre-texting
          1. Creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances
            1. Like calling a credit card company as a spouse's and asking to change account details
            2. Shoulder surfing
              1. Looking over someone's shoulder when they are entering a passwod
              2. Baiting scenarios
                1. Similar to phishing
                  1. A promise of an item or good that hackers use to attract victims
                    1. May offer users free music or movie downloads, if they surrender their login credentials to a certain site
                    2. Tailgating
                      1. Unauthorized person follows an authorized person to enter a secured premise
                      2. Quid-pro-quo
                        1. Hacker offers a service or benefit in exchange for information or access
                          1. Something for something
                          2. Hoax viruses
                            1. Message warning the recipients of a non-existent computer virus threat
                              1. Message is usually a chain e-mail that tells the recipients to forward it to everyone they know
                              Show full summary Hide full summary

                              Similar

                              Types and Components of Computer Systems
                              Jess Peason
                              Input Devices
                              Jess Peason
                              Output Devices
                              Jess Peason
                              Computing
                              Kwame Oteng-Adusei
                              Pack of playing cards answer
                              Karl Taylor
                              Code Challenge Flow Chart
                              Charlotte Hilton
                              Computing Hardware - CPU and Memory
                              ollietablet123
                              Computer Systems
                              lisawinkler10
                              Computer science quiz
                              Ryan Barton
                              GCSE Computing: Hardware
                              Yasmin F
                              Themes in Othello
                              Rebecca Hunter