1.1 Flashcards

1
Q

Typosquatting

A

Using a similar web name, but not exact, or add one extra letting in beginning (prepending)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing is

A

Social engineering via email or text with a falsified url and some type of incorrect spelling, font or graphics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pretexting

A

Lying to get information, through a character they created for this scenario such as “we’re calling from Visa for auto payment of ur utilities”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pharming

A

The take over a real site to redirect to a bogus site (poisoned dns or client vulnerabilities), opportunity now for both pharming and phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing and Smishing

A

Voice phishing caller ID spoofing for fake security checks or bank updates

Or texted based spoofing where links are forwarded and asks for personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How attackers will set up phishing

A

Gather info on victim from social media sites, websites, the. Bud pretext on where one works, where on banks, financial transactions, family and friends. These targeted attacks are called spear phishing because it’s targeted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain spearphishing

A

Targeted attacks based on inside infor for potential of large sum of money. Ex type = Whaling for ceos and chiefs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Impersonations

A

Actor and story to steal info based on a familiar name of a company. They use the pretext of a help desk, or higher rank or using a lot of technical terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eliciting information

A

After gain trust, they start to get the information such as personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dumpster diving

A

To physically look through one’s trash to get personal info. It’s commonly legal in the US, but can’t break law to get access.

So shred, lock up, keep away from public assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shoulder surfing

A

Looking over shoulder physically to get information so use privacy filters to black screen, survey surroundings, keep monitor out of sight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hoaxes

A

A fabricated situation that seems real but seems real that consumes time and resources. Often in email format, or social media post. Some are engineered to take money, even fake malware or fake updates for software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watering hole attacks

A

A third party host that an attacker will know sends and a receives Traffic, they will infect that third party and get info that way. A local coffee shop for example or a common industrial site. They will use a vulnerability infecting all traffic and Hopi g the target is part of the traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam

A

Email, forums, IM (spim), usually unsolicited messages through ads, marketing or malicious natured. Use allowed or filtered lists to counter or block anything non RFC standards (SMTP standards check), or rDNS (reverse dns) where blocks email where senders domain doesn’t match the iP addy. Then recipient filtering (block email not addressed to certain addresses). Finally tarpitting or slowing down server conversation to waste their time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Influencer campaigns

A

Hacking public opinion. Sometimes a nation state, advertising and uses social media. There are fake users, create content, and posted on SM. It amplifies message, so real users share and mass media follows.

Alters policy changes for example. This is cyber warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Other social engineering

A

Tailgating, following after someone opening a door, when that person doesn’t have an ID. Need badges or one scan one person, or Access control vestibule

Invoice scam - knows invoices, sends a fake bill, that u make be using, with a spoofed address, and invoiced
To accounting, to even pay online.

Credential harvesting - gain access to user names and password. Usually starts with a script that starts the attach even through word docs

17
Q

Social engineering attacks uses what principles ..

A

Authority, intimidation, consensus, scarcity, urgency, familiarity, trust