Seguridad 5

Usually install without the user's permission and are usually part of a drive-by download.
Is an attack that attempts to manipulate individuals into performing actions or divulging confidential information.
Is when an attacker requests personal information from a party in exchange for something, like a gift.
Connect the words accordingly:
Authority
Intimidation
Consensus/Social Proof
Scarcity
Urgency
Familiarity/Liking
Trust
People are more likely to comply when instructed by “an authority”
Criminals build a trusting relationship with a victim which may require more time to establish
People will take action when they think there is a limited quantity
Criminals bully a victim into taking action
People will take action if they think that other people like it too
People will take action when they think there is a limited time
Criminals build a rapport with the victim to establish a relationship
0
{"name":"Seguridad 5", "url":"https://www.quiz-maker.com/QBQZPLRSY","txt":"Usually install without the user's permission and are usually part of a drive-by download., Is an attack that attempts to manipulate individuals into performing actions or divulging confidential information., Is when an attacker requests personal information from a party in exchange for something, like a gift.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker