Social Engineering -

Are you Cyber Savvy?

 

Definitions

  Identity Theft To steal the identity of another person.  It involves the use of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge.   
 
 
  Internet Predators People living by or given to victimizing others for personal gain and who use the internet for such personal gain.  This can include scams, encounters, theft, harassment, sexual encounters and other categories.

The term 'Internet Predator' is also used as a shortened form of the term 'Internet Sexual Predator' and is used to include people who prey upon the vulnerable, naive and innocent for personal gain in the form of sexual gratification. A sexual predator is a person who has been convicted of a sexually oriented offense and has been judged by the court as likely to engage in another sexually oriented offense in the future.  An Internet Sexual Predator is a sexual predator who uses the Internet as a means to find, communicate with and meet victims.  Sexual predators include rapists as well as pedophiles.

 
  Malware Spyware, viruses, trojans, worms and other invasive and debilitating programs  
  Pharming Pharming uses the same kind of spoofed sites as phishing does, but uses malware/spyware to redirect users from real websites to the fraudulent sites (typically DNS hijacking).  
  Phish Hacked accounts.  By 1996, hacked accounts were called "phish", and by 1997 phish were actually being traded between hackers as a form of currency. People would routinely trade 10 working AOL phish for a piece of hacking software that they needed.  
  Phishing Creating a replica of an existing Web page to fool a user into submitting personal, financial, or password data.  Phishing, also referred to as brand spoofing or carding, is a variation on fishing, the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
Phishing attacks now target users of online banking, payment services such as PayPal, and online e-commerce sites. Phishing attacks are growing quickly in number and sophistication.

"Ph" is a common hacker replacement for "f", and is a nod to the original form of hacking, known as "phreaking".
 The word phishing comes from the analogy that Internet scammers are using e-mail lures to fish for passwords and financial data from the sea of Internet users. The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users.
 
  Phreaking Phreaking was coined by the first hacker, John Draper (aka. "Captain Crunch"). John invented "hacking" by creating the infamous Blue Box, a device that he used to hack telephone systems in the early 1970s.
This first form of hacking was known as "Phone Phreaking". The blue box emitted tones that allowed a user to control the phone switches, thereby making long distance calls for free, or billing calls to someone else's phone number, etc. This is in fact the origin of a lot of the "ph" spelling in many hacker pseudonyms and hacker organizations.
 
  Social Engineering Social engineering is the art and science of getting people to comply with your wishes. It is accomplished without force or hypnosis and does not cause wild behaviourisms. It is the process with which others may gain access to areas and information without legitimate authorization.  
       
       
       
       
       
       

 Home ] Dolphmera Solutions ] Contact Us ] [ Definitions ] Family Safety ] Identity Theft ] Child Safety - Informative Links ] Identity Theft - Informative Links ]

This website is protected by copyright 1996 Dolphie and its licensors. All rights reserved.
A link is included on each page for non-author created graphics used, if required.
Last Update: 10/21/2005 11:23:37 AM