Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Security Plus: Chapter 2 study guide 2021/2022 (updated)

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
07-06-2022
Written in
2020/2021

Security Plus: Chapter 2 study guide 2021/2022 (updated)Social engineering type of attack that uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines Spoofing soft-ware based attack where the goal is to pretend to be someone else for the purpose of identity concealment 00:03 01:20 Impersonation attacker pretends to be someone they are not Hoax email or web based attack that is intended to trick the user into performing undesired actions, such as deleting files in attempt to remove a virus Phishing email-based social engineering attack; attacker sends and email that seems to come from a respected back or financial institution Vishing goal is to extract personal, financial, or confidential information from the victim by using services such as telephone system and IP-based voice messaging services Whaling form of spear phishing that targets individuals or organizations that are known to possess a good ideal of wealth URL Hijacking (typo squatting) tactic of exploiting typos that users sometimes make when entering a URL Spim spam propagated through IM instead of email Shoulder surfing attack by looking over the shoulder of an individual as they enter password information Tailgating (piggy backing) attack where an attacker will spill in through a secure area following a legitimate employee Hacker: White hats hacker who discovers and exposes security flaws to fix before they become widespread problems

Show more Read less
Institution
Course

Content preview

Security Plus: Chapter 2
Social engineering - Answer type of attack that uses deception and trickery to convince
unsuspecting users to provide sensitive data or to violate security guidelines

Spoofing - Answer soft-ware based attack where the goal is to pretend to be someone
else for the purpose of identity concealment

Impersonation - Answer attacker pretends to be someone they are not

Hoax - Answer email or web based attack that is intended to trick the user into
performing undesired actions, such as deleting files in attempt to remove a virus

Phishing - Answer email-based social engineering attack; attacker sends and email that
seems to come from a respected back or financial institution

Vishing - Answer goal is to extract personal, financial, or confidential information from
the victim by using services such as telephone system and IP-based voice messaging
services

Whaling - Answer form of spear phishing that targets individuals or organizations that
are known to possess a good ideal of wealth

URL Hijacking (typo squatting) - Answer tactic of exploiting typos that users sometimes
make when entering a URL

Spim - Answer spam propagated through IM instead of email

Shoulder surfing - Answer attack by looking over the shoulder of an individual as they
enter password information

Tailgating (piggy backing) - Answer attack where an attacker will spill in through a
secure area following a legitimate employee

Hacker: White hats - Answer hacker who discovers and exposes security flaws to fix
before they become widespread problems

Hacker: Black hats - Answer hacker who discovers and exposes security vulnerabilities
for financial gain or for some malicious purpose

Malicious insider - Answer a threat originating from an employee in an organization

Electronic activist (backtivist) - Answer hacktivist is motivated by a desire to cause
social change

Script kiddie - Answer novice attacker

Written for

Course

Document information

Uploaded on
June 7, 2022
Number of pages
4
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5202
Member since
4 year
Number of followers
3567
Documents
55582
Last sold
9 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions