Provide an example of a social engineering attack.
What will be an ideal response?
An example of a social engineering attack is the so-called Advance Fee Fraud (AFF), which is known internationally as the "4-1-9" fraud (named after a section of the Nigerian penal code). The perpetrators of 4-1-9 schemes often use fictitious companies, such as the Nigerian National Petroleum Company. Alternatively, they may invent other entities, such as a bank, a government agency, or a nongovernmental organization such as a lottery corporation. This scam is notorious for stealing funds from gullible individuals, first by requiring them to send money up-front in order to participate in a proposed money-making venture, and then by charging an endless series of fees. These 4-1-9 schemes have even been linked to kidnapping, extortion, and murder; and they have, according to the United States Secret Service, bilked over $100 million from unsuspecting Americans lured into disclosing personal banking information.
You might also like to view...
Show the student roster (use the format:
What will be an ideal response?
Type I errors are more dangerous than Type II errors
Indicate whether the statement is true or false.
A system administrator is concerned with employees connecting removable storage to the server to copy sensitive data. Which of the following solutions addresses this concern?
A. Disable write access B. Disable WOL C. Disable TPM D. Disable physical ports
A(n) ____ operation permits an event handler to determine the kind of component that generated an event, and then take a different action for each kind of component.
A. assignment B. instanceof C. cast D. referencing