Term
|
Definition
the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft, will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and will capture and steal any information the user enters on the page |
|
|
Term
|
Definition
takes the form of an e-mail message warning the reader of a dangerous new virus and suggesting that the reader pass the message on |
|
|
Term
|
Definition
an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information, attempts are not typically initiated by random hackers, but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information |
|
|
Term
|
Definition
a specific kind of malicious hacking within the more general category of phishing, which involves hunting for data that can be used by the hacker, the targets are high-ranking bankers, executives or others in powerful positions or job titles. |
|
|
Term
|
Definition
It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit. |
|
|
Term
|
Definition
a term sometimes used to refer to spam over IM (Instant Messaging). It's also called just spam, instant spam, or IM marketing. No matter what the name what the name , it consists of unwanted messages transmitted through some form of instant messaging service, which can include Short Message Service (SMS) |
|
|
Term
|
Definition
act of pretending to be someone you are not |
|
|
Term
|
Definition
The strategy the attacker takes is simply to identify a site that is visited by those they are targeting, poisoning that site, and then waiting for the results. |
|
|
Term
|
Definition
type of social engineering, This can be done with threats, with shouting, or even with guilt. |
|
|
Term
|
Definition
Putting the person being tricked at ease by putting the focus on them—listening intently to what they are saying, validating their thoughts, charming them—is the key to this element. |
|
|
Term
|
Definition
Convincing the person who is being tricked that there is a limited supply of something can often be effective if carefully done. |
|
|
Term
|
Definition
Mental guards are often lowered, many times subconsciously, when we are dealing with other individuals that we like. |
|
|
Term
|
Definition
When someone does something for you, there is often a feeling that you owe that person something. |
|
|
Term
|
Definition
The secret for successfully using the urgency element is for the social engineer to convince the individual whom they are attempting to trick that time is of the essence. |
|
|