A+ Core 2 Certification Cram Notes : Security
2.4 Explain the following social-engineering attacks
Social engineering: It is a type of attack that relies on human interaction to manipulate individuals into divulging sensitive information, performing an action, or providing access to a restricted area.
Phishing: It is a type of attack where an attacker sends an email or message that appears to be legitimate and trustworthy, but it is actually a fraudulent attempt to obtain sensitive information, such as login credentials or financial information.
Vishing: It is a type of phishing attack where an attacker uses voice communication, such as phone calls or voice messages, to trick individuals into providing sensitive information.
Shoulder surfing: It is a type of attack where an attacker watches or records an individual's keystrokes or screen activity to obtain sensitive information, such as passwords or credit card numbers.
Whaling: It is a type of phishing attack that targets high-profile or senior individuals, such as executives or celebrities, to obtain sensitive information or gain access to restricted areas.
Tailgating: It is a type of attack where an attacker gains physical access to a restricted area by following an authorized person without authorization.
Impersonation: It is a type of attack where an attacker pretends to be someone else, such as an authority figure or a trusted individual, to gain access to restricted areas or sensitive information.
Dumpster diving: It is a type of attack where an attacker searches through trash or discarded materials to obtain sensitive information, such as passwords or account numbers.
Evil twin: It is a type of attack where an attacker creates a fake wireless access point that appears legitimate to users, but actually captures sensitive information, such as login credentials or credit card numbers.