Hacking Techniques - Social Engineering

Descrição

GCSE Computing Mapa Mental sobre Hacking Techniques - Social Engineering, criado por Elissa Hill em 20-02-2018.
Elissa Hill
Mapa Mental por Elissa Hill, atualizado more than 1 year ago
Elissa Hill
Criado por Elissa Hill quase 7 anos atrás
31
0

Resumo de Recurso

Hacking Techniques - Social Engineering
  1. Pharming
    1. Malicious code is installed on a personal computer or server
      1. Misdirects users to fraudulent web sites without their knowledge or consent
        1. A computer with a compromised host file will go to the fake Web site even if a user types in the correct internet address
        2. Blagging/pre-texting
          1. Creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances
            1. Like calling a credit card company as a spouse's and asking to change account details
            2. Shoulder surfing
              1. Looking over someone's shoulder when they are entering a passwod
              2. Baiting scenarios
                1. Similar to phishing
                  1. A promise of an item or good that hackers use to attract victims
                    1. May offer users free music or movie downloads, if they surrender their login credentials to a certain site
                    2. Tailgating
                      1. Unauthorized person follows an authorized person to enter a secured premise
                      2. Quid-pro-quo
                        1. Hacker offers a service or benefit in exchange for information or access
                          1. Something for something
                          2. Hoax viruses
                            1. Message warning the recipients of a non-existent computer virus threat
                              1. Message is usually a chain e-mail that tells the recipients to forward it to everyone they know

                              Semelhante

                              Types and Components of Computer Systems
                              Jess Peason
                              Input Devices
                              Jess Peason
                              Output Devices
                              Jess Peason
                              Computing
                              Kwame Oteng-Adusei
                              Pack of playing cards answer
                              Karl Taylor
                              Code Challenge Flow Chart
                              Charlotte Hilton
                              Computing Hardware - CPU and Memory
                              ollietablet123
                              Computer Systems
                              lisawinkler10
                              Computer science quiz
                              Ryan Barton
                              GCSE Computing: Hardware
                              Yasmin F
                              A Era Vargas (1930-45)
                              Alice Sousa