Linda’s organization recently experienced a social engineering attack.
The attacker called a help desk employee and persuaded her that she was a project manager on a tight deadline and locked out of her account.
The help desk technician provided the attacker with access to the account.
What social engineering principle was used?
Urgency
In what type of social engineering attack does the attacker physically observe the victim’s activity?
Shoulder Surfing
What type of website does the attacker use when waging a watering hole attack?
Site trusted by the end user
In what technique do attackers pose as their victim to elicit information from third parties?
Pretexting
What type of phishing attack focuses specifically on senior executives of a targeted organization?
Whaling