ADJUS-120 Lecture Notes - Lecture 12: Phishing, Ransomware, Computer Hardware
Document Summary
Used proficiently, social engineering can enable adversaries to bypass security measures they were unable to overcome via technical means. Not all social engineering attacks are designed to yield pieces of sensitive information. Phishing scams might be the most common types of social engineering attacks. Spear-phishing: increase in sophistication of attack - limit the target audience and increase the precision of their messages; increases the appeal of the message and apparent legitimacy. Seek to obtain personal information, such as names, addresses, date of birth and tax file numbers. Use link shorteners or embed links that redirect users to suspicious websites in. Incorporates threats, fear and/or sense of urgency to manipulate the user into acting quickly. Covers a range of white collar crimes, including corporate crime, occupational crime, governmental crime, fraud, money laundering and a range of other wcc"s. Focus is explaining, detecting and preventing white collar crime. All organization in an organism functions to increase reproduction.