Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain One

Subdomain 1.1

Compare and contrast different types of social engineering techniques.

The act of gathering info on an attack by taking advantage of the weakest part of security: people.

Terms: 32


Phishing

Smishing

Vishing

Spam

Spam over instant messaging (SPIM)

Spear phishing

Dumpster diving

Shoulder surfing

Pharming

Tailgating

Eliciting information

Whaling

Prepending

Identity fraud

Invoice scams

Credential harvesting

Reconnaissance

Hoax

Impersonation

Watering hole attack

Typosquating

Pretexting

Influence Campaigns

Usually nation-state actors that divide, distract, persuade and sway public opinion on political and social issues.

Hybrid Warfare
Social Media

Principles -reasons for effectiveness

Principles of Social Engineering and their reasons for effectiveness.

Authority
Intimidation
Consensus
Scarcity
Familiarity
Trust
Urgency

Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.