COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Disguising yourself as an employee to gain access to computer systems
|
|
Sending an email with a virus you created attached to it
|
|
Using brute force to access a system
|
|
Calling someone pretending to be IT support to steal confidential data
|
Detailed explanation-1: -Baiting. As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. Pretexting. Phishing. Spear phishing.
Detailed explanation-2: -Types of Social Engineering Attacks. For the purposes of this article, let’s focus on the six most common attack types that social engineers use to target their victims. These are phishing, pretexting, baiting, quid pro quo, tailgating and CEO fraud.
Detailed explanation-3: -Social Engineering: Social Engineering is type of attack in which someone with very good interactive skills manipulates others into revealing information about network that can be used to steal data.