1.1 Flashcards

1
Q

What is phishing

A

Social engineering with a touch of spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different ways phishing is delivered

A

Email, Text, Voice, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to spot a phishing attempt

A

check url, spelling, different fonts, website graphics are different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is TypoSquatting?

A

A type of URL hijacking that purposely uses misspelled domains for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is prepending?

A

Adding an extra letter to the beginning of a url - ex. https://pprofessormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is pretexting?

A

When attackers lie to get info out of a situation they created.

– Hi, we’re calling from Visa regarding an automated
payment to your utility service…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Pharming?

A

Redirecting a legit website to a fake/attackers bogus site

- Poisoned DNS server or client vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Combine Pharming with Phishing

A

Pharming - Redirecting everyone from a legit website to bogus site
Phishing - Collects access credentials from pharmed victims

side note:
- Difficult for anti-malware software to stop since everything appears legitimate to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Vishing?

A

Voice phishing - Done over the phone or voicemail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats the point of vishing?

A

For you to give up personal information that attackers can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Smishing?

A

SMS Phishing - Done by texts

usually in the form of a link which attackers will use to get more information from you if clicked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Spear Phishing?

A

Targeted phishing at a specific individual or department within an organization that appears to be from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Whaling?

A

Targeted phishing attack that targets high-profile employees

-CEO, CFO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is impersonation?

A

Attackers pretending to be someone they aren’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to protect against impersonation?

A

Never give information like Passwords, or Personal Details

Verify before revealing information (Call back, verify through 3rd parties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Dumpster Diving?

A

Searching through garbage for important information

17
Q

How to protect against dumpster diving

A

Secure your garbage and shred/burn documents

18
Q

What is Shoulder surfing?

A

Social engineering technique used to obtain information by looking over the victims shoulder

19
Q

How to prevent shoulder surfing

A

Be aware of surroundings and use privacy filters on computer screens

20
Q

What is a hoax?

A

A threat that doesn’t actually exist

  • Often an email, facebook post, tweet, etc.
  • Some will try to take your money
21
Q

What is a watering hole attack?

A

An attack that infects a website often visited by the victim so the victim will become infected once visited again

22
Q

How to defend against a watering hole attack?

A

Layered defense
Firewalls and IPS - Stop the network traffic before things get bad
Anti-virus/Anti-malware signature updates

23
Q

What is spam?

A

Unsolicited messages from emails, online forums, etc.`

24
Q

What is SPIM?

A

Spam over Instant Messaging

25
Q

How to stop Spam?

A

Use an allowed list - Only receive emails from trusted senders (lots of maintenance)
SMTP standards checking - Block anyhting that doesn’t follow RFC standards
rDNS or Reverse DNS - Block emails where the senders domain doesn’t match the ip (a system would look at the incoming email and use rDNS to look for the known ip address of the website the email claims to be from and see if the known ip matches the ip from current email)

26
Q

What is tailgating?

A

When an unauthorized person follows someone into a building

27
Q

What are invoice scams?

A

Attacker will spear phish and find who pays the bills and will send an invoice directly to the victim asking them to pay a bill

28
Q

What is credential harvesting?

A
  • Also called password harvesting - attacker collects login credentials from the victim from their computer.
  • Things like chrome, firefox, outlook etc. can save login/password and attackers will send an email to victim with malicious code that runs a macro which will harvest the login information and can even email it to the attackers
  • Anti-virus and Anti-malware can detect this