1.1 Flashcards
Compare and contrast different types of social engineering techniques.
Is a type of cyber attack where attackers attempt to trick individuals into disclosing sensitive information. The attackers typically disguise themselves as trustworthy entities, using deceptive emails, messages, or websites to manipulate users into taking actions that they otherwise wouldn’t.
Phishing
What is this list examples of?
1. Be Skeptical of Unsolicited communications
2. Check email sender information
3. Avoid clicking on suspicious links.
4. Verify Requests for Personal Information
5. If a website, check the URL. Additionally, there’s usually something not quite right on the website. (Spelling, fonts, graphics)
Ways to avoid Phishing
How is phishing so successful?
Phishing is so successful because it is digital slight of hand.
Is a type of Phishing that is done through text. (SMS Phishing)
Smishing
Is a type of Phishing that is done over the phone or voicemail. (Voice Phishing)
Vishing
Are unsolicited, irrelevant, or inappropriate messages sent over the internet. These messages are typically sent in large volumes to users, and they can take various forms, such as emails, instant messages, comments on websites, or social media posts.
Spam
Is a variation of SPAM that is delivered via instant messaging
Spam Over Instant Messaging (SPIM)
Is phishing that targets a specific person or group of people. Is targeted phishing with inside information. Makes the attack more believable.
Spear Phishing
Is the act of searching through garbage for personal information.
Dumpster Diving
Is the practice of spying on someone’s computer screen or mobile device screen to obtain sensitive information.
Shoulder Surfing
Is a cyber attack technique where attackers redirect the traffic of a legitimate website to a fraudulent or malicious website without the users’ knowledge. The goal of this attack is to collect sensitive information such as usernames, passwords, or financial details from unsuspecting users.
Pharming
When an unauthorized person uses an authorized person to gain access to a building.
Tailgating
The act of coercing information from the victim using social engineering and psychological techniques. For example, calls to and from a Help Desk can be used to go about _____________ .
Eliciting Information
Targeted phishing with the possibility of a large catch. High-value targets are referred to as ‘Whales’, such as a CEO or CFO.
Whaling
The act of adding something else to the beginning of an item. When used in a social engineering context, it is the act of supplying information to legitimize a request. Ex: An attacker can use ____________ by stating they were sent by the target’s boss, as a means to justify why the target should perform a specific action.
Prepending