COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
MITM attack
|
|
Spear phishing
|
|
Shoulder surfing
|
|
Tailgating
|
Detailed explanation-1: -5. Which of the following is not an example of social engineering? Explanation: Carding is the method of trafficking of bank details, credit cards or other financial information over the internet. Hence it’s a fraudulent technique used by hackers and does not comes under social engineering.
Detailed explanation-2: -There is a predictable four-step sequence to social engineering attacks, typically referred to as the attack cycle. It includes the following: information gathering, establishing relationship and rapport, exploitation, and execution.
Detailed explanation-3: -Phishing. Whaling. Diversion Theft. Baiting. Honey Trap. Pretexting. SMS Phishing. Scareware. More items •12-Dec-2022
Detailed explanation-4: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.