Social Engineering
What is the best defense against social engineering?
The backbone of social engineering lies in the ability of an attacker to trick a user into __________
What are the six main types of motivational triggers social engineers use?
What is the reason social engineers use a sense of urgency in their tactics?
What are the four main forms of impersonation used by social engineers?
When it comes to impersonation, attackers must first __________ about the organization so they can more easily earn the trust of their targeting users
Brand Impersonation
Typosquatting
Watering Hole Attacks
Pretexting
Phishing
Spear Phishing
Whaling
Business Email Compromise (BEC)
Vishing (Voice Phishing)
Smishing (SMS Phishing)
Anti-Phishing Campaign
What are some of the common characteristics of phishing emails?
Fraud
Identity fraud or Identity theft
What is the difference between identity fraud and identity theft?
Invoice Scam
Influence Campaigns