top of page
Glossary
# - B
C - E
F - I
J - M
N - R
S - T
U - Z
The act of manipulating people so they give up confidential information that is of value to criminals, such as bank information, passwords, or other personal information. Phishing (https://www.mynetwatchman.tech//s/f/phishing-smishing)is an example of social engineering.
An advanced form of phishing (https://www.mynetwatchman.tech//s/f/phishing-smishing)where the attacker targets a specific individual or organization. The messages are crafted to appear to come from a sender known to the recipient. Spear phishers research their victims through social media and other online sources to create a more convincing scam.
Credentials (https://www.mynetwatchman.tech//s/f/credential-cred)that don’t change. Often used in computing as credentials for databases or similar systems so that development teams or automated processes can use the credentials without the disruption of changing them. Also can refer to consumer credentials when the consumer fails to change their passwords. Different from transient / dynamic credentials that change regularly, e.g., a rotating code in an authenticator application.
The practice of requiring additional levels of authentication (https://www.mynetwatchman.tech//s/f/authenticate)as users progress to higher risk categories. For example, if a call to AllCreds (https://www.mynetwatchman.tech/credscreening)shows a logging in user’s credentials are compromised, companies can use step-up authentication to direct the user to a second form of authentication like a token code or emailed code.
An email address usually created by a miscreant (https://www.mynetwatchman.tech//s/f/miscreant-30717)for the purpose of setting up fake accounts. Often created by script or automation with a pattern, e.g., incrementing numbers. Different from a legitimate address created by an individual for personal use.
An identity created by a combination of real and fake personal information. For example, a stolen social security number can be combined with a fake name and address to create a new identity. Fraudsters (https://www.mynetwatchman.tech//s/f/fraudster-fraud)often use synthetic identities to commit financial fraud such as applying for loans, submitting tax returns, or setting up mule accounts to launder money.
Credentials (https://www.mynetwatchman.tech//s/f/credential-cred)that change over time. Often used in addition to static credentials (https://www.mynetwatchman.tech//s/f/static-credential-s)as an additional level of authentication,(https://www.mynetwatchman.tech//s/f/authenticate) e.g., during step-up authentication (https://www.mynetwatchman.tech//s/f/step-up-43256)or 2FA.(https://www.mynetwatchman.tech//s/f/2fa-two-factor) Examples: one-time passwords, session tokens, etc.
bottom of page
