Question: Objective: Understand the various ways that social engineering can be performed. Video: Lab 1 0 Ethical Hacking These are nine of the most common examples

Objective: Understand the various ways that social engineering can be performed.
Video: Lab 10 Ethical Hacking
These are nine of the most common examples of social engineering are, provide a short
definition for each:
1. Phishing:_____________________________________________________
2. Spear Phishing:_______________________________________________
3. Baiting:______________________________________________________
4. Malware:_____________________________________________________
5. Pretexting:____________________________________________________
6. Quid Pro Quo:_________________________________________________
7. Tailgating:_____________________________________________________
8. Vishing:_______________________________________________________
9. Water-Holing:__________________________________________________
How Does Social Engineering Happen?
Social engineering happens because of the human instinct of trust. Cybercriminals have learned
that a carefully worded email, voicemail, or text message can convince people to transfer money,
provide confidential information, or download a file that installs malware on the company
network.
Consider this example of spear phishing that convinced an employee to transfer $500,000 to a
foreign investor:
1. Thanks to careful spear phishing research, the cybercriminal knows the company CEO is
traveling.
2. An email is sent to a company employee that looks like it came from the CEO. There is a slight
discrepancy in the email address but the spelling of the CEOs name is correct.
3. In the email, the employee is asked to help the CEO out by transferring $500,000 to a new
foreign investor. The email uses urgent yet friendly language, convincing the employee that he
will be helping both the CEO and the company.
4. The email stresses that the CEO would do this transfer herself but since she is travelling, she
cant make the fund transfer in time to secure the foreign investment partnership.
5. Without verifying the details, the employee decides to act. He truly believes that he is helping
the CEO, the company, and his colleagues by complying with the email request.
6. A few days later, the victimized employee, CEO, and company colleagues realize they have been
a victim of a social engineering attack and have lost $500,000.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!