Add second year
This commit is contained in:
@ -0,0 +1,84 @@
|
||||
- #[[CT255 - Next Generation Technologies II]]
|
||||
- **Previous Topic:** [[Hash Cracking Using Rainbow Tables]]
|
||||
- **Next Topic:** null
|
||||
- **Relevant Slides:** 
|
||||
-
|
||||
- What is **Social Engineering**? #card
|
||||
card-last-interval:: 2.51
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-22T20:27:18.812Z
|
||||
card-last-reviewed:: 2022-10-20T08:27:18.813Z
|
||||
card-last-score:: 5
|
||||
- **Social Engineering** is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
|
||||
- What is **Phishing**? #card
|
||||
card-last-interval:: 2.8
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-21T06:54:27.184Z
|
||||
card-last-reviewed:: 2022-10-18T11:54:27.185Z
|
||||
card-last-score:: 5
|
||||
- **Phishing** usually involves sending malicious emails from supposedly trusted sources to as many people as possible, assuming a low response rate.
|
||||
- What is **Spear Phishing**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-19T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-19T08:46:14.845Z
|
||||
card-last-score:: 1
|
||||
- In **Spear Phishing**, the perpetrator is disguised as a trusted individual, such as a boss, friend, or spouse.
|
||||
- What is **Whaling**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-18T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-18T13:35:19.691Z
|
||||
card-last-score:: 1
|
||||
- **Whaling** uses deceptive email messages targeting high-level decision makers within an organisation, such as CEOs or other executives.
|
||||
- Such individuals have access to highly valuable information, including trade secrets & passwords to administrative company accounts.
|
||||
- What is **Smishing**? #card
|
||||
card-last-interval:: 2.8
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-21T06:54:56.627Z
|
||||
card-last-reviewed:: 2022-10-18T11:54:56.627Z
|
||||
card-last-score:: 5
|
||||
- **Smishing** is portmanteau for "SMS Phishing", and it works much the same as phishing.
|
||||
- Users are tricked via an SMS text rather than from an email.
|
||||
- What is **Vishing**? #card
|
||||
card-last-interval:: 2.8
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-21T03:22:41.159Z
|
||||
card-last-reviewed:: 2022-10-18T08:22:41.159Z
|
||||
card-last-score:: 5
|
||||
- **Vishing**, also called **VOIP Phishing** is the voice counterpart to phishing.
|
||||
- For example, an email asks the user to make a phone call, or victims receive an unsolicited call.
|
||||
- What is **Pretexting**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-18T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-18T08:43:38.466Z
|
||||
card-last-score:: 1
|
||||
- **Pretexting** is the practice of presenting oneself as someone else in order to obtain private information.
|
||||
- It is more than just creating a lie, in some cases, it can involve creating an entirely new identity and then using that identity to manipulate the receipt of information.
|
||||
- Pretexting goes hand-in-hand with vishing.
|
||||
- What is a **Watering Hole** attack? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-18T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-18T11:54:50.815Z
|
||||
card-last-score:: 1
|
||||
- A **Watering Hole** attack consists of injecting malicious code into public web pages of a website that the target visits.
|
||||
- The attackers typically compromise websites within a specific sector that are typically visited by specific individuals of interest for the attacks.
|
||||
- What is **Pharming**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-19T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-19T08:46:58.169Z
|
||||
card-last-score:: 1
|
||||
- **Pharming** scams redirect users to a copy of a popular website where personal data such as usernames, passwords, & financial information can be "farmed" & collected for fraudulent use.
|
||||
-
|
@ -0,0 +1,84 @@
|
||||
- #[[CT255 - Next Generation Technologies II]]
|
||||
- **Previous Topic:** [[Hash Cracking Using Rainbow Tables]]
|
||||
- **Next Topic:** [[DIffie-Hellman Key Exchange]]
|
||||
- **Relevant Slides:** 
|
||||
-
|
||||
- What is **Social Engineering**? #card
|
||||
card-last-interval:: 2.51
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-22T20:27:18.812Z
|
||||
card-last-reviewed:: 2022-10-20T08:27:18.813Z
|
||||
card-last-score:: 5
|
||||
- **Social Engineering** is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
|
||||
- What is **Phishing**? #card
|
||||
card-last-interval:: 2.8
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-21T06:54:27.184Z
|
||||
card-last-reviewed:: 2022-10-18T11:54:27.185Z
|
||||
card-last-score:: 5
|
||||
- **Phishing** usually involves sending malicious emails from supposedly trusted sources to as many people as possible, assuming a low response rate.
|
||||
- What is **Spear Phishing**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-19T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-19T08:46:14.845Z
|
||||
card-last-score:: 1
|
||||
- In **Spear Phishing**, the perpetrator is disguised as a trusted individual, such as a boss, friend, or spouse.
|
||||
- What is **Whaling**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-18T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-18T13:35:19.691Z
|
||||
card-last-score:: 1
|
||||
- **Whaling** uses deceptive email messages targeting high-level decision makers within an organisation, such as CEOs or other executives.
|
||||
- Such individuals have access to highly valuable information, including trade secrets & passwords to administrative company accounts.
|
||||
- What is **Smishing**? #card
|
||||
card-last-interval:: 2.8
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-21T06:54:56.627Z
|
||||
card-last-reviewed:: 2022-10-18T11:54:56.627Z
|
||||
card-last-score:: 5
|
||||
- **Smishing** is portmanteau for "SMS Phishing", and it works much the same as phishing.
|
||||
- Users are tricked via an SMS text rather than from an email.
|
||||
- What is **Vishing**? #card
|
||||
card-last-interval:: 2.8
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.6
|
||||
card-next-schedule:: 2022-10-21T03:22:41.159Z
|
||||
card-last-reviewed:: 2022-10-18T08:22:41.159Z
|
||||
card-last-score:: 5
|
||||
- **Vishing**, also called **VOIP Phishing** is the voice counterpart to phishing.
|
||||
- For example, an email asks the user to make a phone call, or victims receive an unsolicited call.
|
||||
- What is **Pretexting**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-18T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-18T08:43:38.466Z
|
||||
card-last-score:: 1
|
||||
- **Pretexting** is the practice of presenting oneself as someone else in order to obtain private information.
|
||||
- It is more than just creating a lie, in some cases, it can involve creating an entirely new identity and then using that identity to manipulate the receipt of information.
|
||||
- Pretexting goes hand-in-hand with vishing.
|
||||
- What is a **Watering Hole** attack? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-18T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-18T11:54:50.815Z
|
||||
card-last-score:: 1
|
||||
- A **Watering Hole** attack consists of injecting malicious code into public web pages of a website that the target visits.
|
||||
- The attackers typically compromise websites within a specific sector that are typically visited by specific individuals of interest for the attacks.
|
||||
- What is **Pharming**? #card
|
||||
card-last-interval:: -1
|
||||
card-repeats:: 1
|
||||
card-ease-factor:: 2.5
|
||||
card-next-schedule:: 2022-10-19T23:00:00.000Z
|
||||
card-last-reviewed:: 2022-10-19T08:46:58.169Z
|
||||
card-last-score:: 1
|
||||
- **Pharming** scams redirect users to a copy of a popular website where personal data such as usernames, passwords, & financial information can be "farmed" & collected for fraudulent use.
|
||||
-
|
Reference in New Issue
Block a user