ADJUS-120 Lecture Notes - Lecture 12: Phishing, Ransomware, Computer Hardware

13 views2 pages

Document Summary

Used proficiently, social engineering can enable adversaries to bypass security measures they were unable to overcome via technical means. Not all social engineering attacks are designed to yield pieces of sensitive information. Phishing scams might be the most common types of social engineering attacks. Spear-phishing: increase in sophistication of attack - limit the target audience and increase the precision of their messages; increases the appeal of the message and apparent legitimacy. Seek to obtain personal information, such as names, addresses, date of birth and tax file numbers. Use link shorteners or embed links that redirect users to suspicious websites in. Incorporates threats, fear and/or sense of urgency to manipulate the user into acting quickly. Covers a range of white collar crimes, including corporate crime, occupational crime, governmental crime, fraud, money laundering and a range of other wcc"s. Focus is explaining, detecting and preventing white collar crime. All organization in an organism functions to increase reproduction.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents