COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
|
|
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
|
|
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
|
|
Looking at someone entering their personal data into a system and copying what you see.
|
Detailed explanation-1: -Definition(s): A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
Detailed explanation-2: -SMS phishing or smishing is a type of phishing attack that uses text messages from a cell phone or smartphone to deliver a bait message. The victim is usually asked to click a link, call a phone number, or contact an email address provided by the attacker.
Detailed explanation-3: -What is a common indicator of a phishing attack? Requests for personal information, generic greetings or lack of greetings, misspellings, unofficial “from” email addresses, unfamiliar webpages, and misleading hyperlinks are the most common indicators of a phishing attack.
Detailed explanation-4: -Whaling. Whaling attacks are even more targeted, taking aim at senior executives. Although the end goal of whaling is the same as any other kind of phishing attack, the technique tends to be a lot subtler.