Please enable JavaScript.
Coggle requires JavaScript to display documents.
SOCIAL ENGINEERING - Coggle Diagram
SOCIAL ENGINEERING
refer to techniques or psychological tricks used to get people comply with perpretator's wishes in order to gain physical or logical access to building, computer, network
Identity theft
Assume someone's identity usually for economic gain by illegally obtaining and using confidential information
-
Pretexting
Invented scenario to increase the likelihood that a victim will divulge information or do something
-
-
Posing
Creating a seemingly legitimate business, collecting personal information while making a sale but never delivering the product
-
Phishing
Sending an electronic message pretending to be legitimate company, usually a financial institution and requesting information or verification.
-
Vishing
Known as voice phishing, victim enters confidential data by phone
Carding
Activities performed on stolen credit cards including making a small online purchase to determine whether the card is still valid
-
-
Typosquatting /URL hijacking
Setting up similarly named websites so that users making typographical errors when entering a website name are sent to an invalid site
Typing google.com but might lead to site that distributes malware such as viruses, spyware
Evil twin
Wireless network with the same as a legitimate wireless access point. it also called Service Set Identifier
Scavenging /Dumpster diving
Searching documents and records to gain access to confidential information. Some identity thieves search garbage cans, communal trash bins and city dumps to find information
Shoulder surfing
Perpetrators look over a person's shoulders in a public place to get information such as ATM PIN numbers or user IDs and passwords
Fraudster use sophisticated skimming devices placed right over a card reader slot to capture data stored on card's magnetic strip
Lebanese looping Perpretator inserts a sleeve into an ATM that prevents the ATM from ejecting the card
Skimming
Double-swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that records credit card data for later use
Chipping
Planting a small chip that records transaction data in a legitimate credit card reader. The chip will later removed or electronically accessed to retrieve the data recorded on it
-