answersLogoWhite

0


Best Answer

Social engineering is a computer security term for tricking a person into revealing their

password or other personal and financial information.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

Yes, it is usually done with a malicious intent

This answer is:
User Avatar

User Avatar

Wiki User

9y ago

Phishing scams.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Is a malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous webpages?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

The process of revealing confidential information is known as?

Phishing.


What does it mean if someone has loose lips?

Someone who has "loose lips" is characteristic for being overly talkative, especially with respect to revealing information which is private or confidential.


What are some examples of pharmacists violating patients' rights?

A huge example would be revealing their confidential information to a third party (ie not a doctor or another pharmacist)


What if you reveal someones expunged records?

The only way you could have knowledge of someone's expunged information would be if you were a member or employee of some government agency. For revealing confidential information you could lose your job AND be prosecuted.


How do you list an employer as confidental on resume?

Rather than actually listing an employer as confidential on the resume, it might be wise to make a statement like "Confidential Employer Available" This would give you the option of either revealing or not revealing the employer at your discretion.


Why is it ok to pass on confidential information without the consent of individual parties when making a report?

Generally and ethically it isn't OK. It may even be illegal. Some profession are prohibited from revealing confidential matters without a court order. Lawyers and doctors for instance.


What is an example of unethical behavior in information processing?

For instance, revealing confidential information, stealing the ideas of others, copying software, and punching the time clock from home are unethical behaviors. Unauthorized copying of software--software piracy--is stealing.


What are the Exploiting people to gain sensitive information is most associated with?

"Exploiting people to gain sensitive information is most associated with social engineering tactics, where attackers manipulate individuals into revealing confidential data by exploiting their trust, naivety, or emotions."


Do businesses share their email lists with each other?

Businesses typically keep their email lists and contacts confidential unless there is a motive for sharing the information. Sharing contacts can often mean revealing sales leads or business secrets.


What type of attack is it when are asked personal questions during a survey?

It is a form of social engineering attack known as pretexting, where attackers gather personal information by pretending to be someone they're not to gain trust and manipulate victims into revealing sensitive information. This stolen information can then be used for malicious purposes like identity theft or fraud.


What Exploiting people to gain sensitive information is most associated with?

Social engineering, such as phishing or pretexting, is often used to exploit people in order to gain sensitive information. These tactics rely on manipulating individuals into revealing confidential data or granting unauthorized access through deception and manipulation.


What does the saying to tell tales out of school mean?

The saying "to tell tales out of school" means to share secrets or information that should remain confidential, particularly about someone else or a private matter. It suggests revealing information that one is not supposed to or that is meant to be kept hidden.