COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Using a scenario to gain information or perform actions
|
|
Encouraging someone to spend their money on something expensive
|
|
Using software on a computer to access personal information
|
|
Using social media to get friends by telling untruths about yourself
|
Detailed explanation-1: -Blagging or pretexting is the act of creating and using an invented scenario, to engage a targeted victim in a manner that increases the chance the victim will divulge information, or perform actions, that would be unlikely in ordinary circumstances.
Detailed explanation-2: -Blagging is when someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money. For example, a person may receive an email that appears to be from a friend telling them that they’re in trouble and asking them to send money.
Detailed explanation-3: -A blagging attack is a version of a phishing attack, again with its background in social engineering. Blagging is the act of inventing a specific scenario to try and engage with the victim. The scenario will be set up so that it increases the chance that the victim will share their sensitive information or data.
Detailed explanation-4: -In cybersecurity, blagging would fall under the umbrella of social engineering. In that case, blagging would be akin to other forms of social engineering like phishing where cybercriminals get your online account credentials in ingenious ways. In effect, the blagger steals your identity and more.
Detailed explanation-5: -While phishing attacks tend to use urgency and fear to exploit victims, pretexting attacks establish a false sense of trust with a targeted victim. This requires threat actors to establish a credible story that does not make victims suspicious of any foul play.