1.1 Compare and contrast different types of social engineering techniques. Flashcards
What is Phishing?
An attacker posing as a trusted source but attempts to deliver a malicious payload or gather personal or sensitive information from an individual. The email typically claims that the user needs to connect to or log onto a site; this site may look very convincing but it is fake. The link in an email may download malicious software that perform attacks on a system.
What is Smishing?
A smishing attack is a phishing attack that uses SMS instead of email. These are cleverly designed to look like common texts received from vendors.
What is Vishing?
Another form of phishing that is often done over Voice over IP (VoIP). Can be effective if prerecorded and using a spoofed telephone number to convince a target that the message is legitimate.
What is Spam?
It is an unsolicited e-mail, usually advertising a product or service. A small amount of spams are really trying to steal your info.
What is Spam over instant messaging (SPIM)?
It is Spam received over instant messaging instead of email.
What is Spear Phishing?
A form of phishing that is designed to target a certain group or individual instead of a generic email sent to a mass of people. These emails typically use info that is personal to the victims so that this lends credibility to the attacker to persuade them that the email is legit. Another tactic may to spoof a known sender.
What is dumpster diving?
Attackers go dumpster diving for social engineering by trying to find information on a company that gives them further insight into operations, missions, etc. This can be prevented with screening trash.
What is Shoulder Surfing?
When a person inconspicuously looks over a victim’s shoulders to see what they are viewing or typing.
What is Pharming?
In a pharming attack, the user is redirected to a fake site through some other means, such as malware on the computer, host file poisoning, or redirection from a DNS server that has been compromised
What is Tailgating?
When an individual follows an authorized person through a security checkpoint or door to gain access to unauthorized areas. To mitigate, an organization needs to positively identify every individual. Mantraps are used to guard against tailgating.
What is Eliciting Information?
Gathering info through various means. A common was to gather info is through social engineering.
What is Whaling?
A form of phishing that sends an email to a high-value target instead of the masses. These emails are higher stakes because high-value individuals have info that may be considered more critical to attackers.
What is Prepending?
A link that adds an unexpected payload at the beginning.
What is Identity fraud?
It is using someone else’s PII for personal gain.
What is an Invoice Scam?
An attacker submits a fake invoice that mimics that vendor’s invoice in every aspect except the payment destination that is the attacker’s info.