CHAPTER 10 Audit in CIS Environment
CHAPTER 10 Audit in CIS Environment
CHAPTER 10 Audit in CIS Environment
TECHNIQUE DESCRIPTION
Sexting Exchanging explicit texts and pictures.
Shoulder Surfing Watching or listening to people enter or
disclose confidential data.
Skimming Double swiping a credit card or covertly
swiping it in a card reader that records the
data for later use.
SMS Spoofing Using short message service (SMS) to change
the name or number a text message appears
to come from.
Social Engineering Techniques that trick a person into disclosing
confidential information.