CEH
What Is Social Engineering? 239 engineer can observe these habits and use them to track people or follow the actions of groups, ...
240 Chapter 10 ■ Social Engineering Te r r o r i s m Perhaps one of the more visible forms of social engineering is terrorism. I ...
What Is Social Networking? 241 Many times over the years I have noticed the tendency for system administrators to leave themselv ...
242 Chapter 10 ■ Social Engineering ■ Is this information that you would freely share offline? ■ Is this information that you wi ...
What Is Social Networking? 243 Mistakes in Social Media and Social Networking Social media can be made safer if you take simple ...
244 Chapter 10 ■ Social Engineering Many types of scams can ensnare users by preying on an aspect of human nature that entices p ...
What Is Social Networking? 245 Amber Alert Issued!! This one is not so much as scam as it is a hoax. Amber alerts are pasted int ...
246 Chapter 10 ■ Social Engineering ■ Educate employees on the use of strong passwords like the ones they use, or should be usin ...
Commonly Employed Threats 247 Dumpster Diving One man’s trash is another man’s treasure, and an attacker may be able to collect ...
248 Chapter 10 ■ Social Engineering Using a Pop-up Blocker A modern browser recognizes potentially dangerous pop-ups, lets you k ...
Commonly Employed Threats 249 online banking. The same is true in an office, where a nosy coworker peering over a cubicle wall o ...
250 Chapter 10 ■ Social Engineering Identity Theft One of the most prominent and rapidly evolving threats is identity theft, whi ...
Identity Theft 251 Although some sites are moving away from the practice, it is not uncommon to run into websites that use stand ...
252 Chapter 10 ■ Social Engineering One of the tools on this list, Intellius, is a great example of how accessible personal info ...
Exam Essentials 253 Know about technology fixes. Technology such as anti-spyware and anti-malware tools can mitigate some social ...
254 Chapter 10 ■ Social Engineering Review Questions Phishing takes place using. A. Instant messaging B. E-mail C. Websites D. ...
Review Questions 255 Phishing can be mitigated through the use of. A. Spam filtering B. Education C. Antivirus D. Anti-malware ...
256 Chapter 10 ■ Social Engineering A security camera picks up someone who doesn’t work at the company following closely behind ...
Review Questions 257 An attacker can use which technique to influence a victim? A. Tailgating B. Piggybacking C. Name-dropping ...
...
«
10
11
12
13
14
15
16
17
18
19
»
Free download pdf