1.1 - Compare and contrast different types of social engineering techniques. Flashcards
Compare and contrast different types of social engineering techniques.
1
Q
Social Engineering
A
- Used to extract info usually by tricking ppl
- Precursor to more advanced attacks
- Successful b/c relies on emotions
2
Q
Principles of influence/Reasons for effectiveness
(just the list, no description)
A
- Authority
- Intimidation
- Consensus/Social proof
- Scarcity
- Familiarity/Liking
- Trust
- Urgency
3
Q
Principles of influence - Authority
A
- Perceived by job titles, uniforms, badges, symbols, expertise
- Feel obligated to comply
- Trust authoritative symbols
- EX: Flashing red lights would prompt you to pull over
4
Q
Principles of influence - Intimidation
A
- Authority plays to sense of duty
- Negative impact if you don’t comply
- Plays on fear of getting in trouble, fired, etc
- EX: If you don’t help, payroll won’t be processed
5
Q
Principles of influence - Consensus/Social Proof
A
- “Safety in numbers”
- Ppl often believe what others around them believe
- Ambiguous requests/situations likely acted on b/c believe others are doing the same
- Convince based on what’s normally expected
- EX: Robert already complied with this
6
Q
Principles of influence - Scarcity
A
- Want/value something more if we believe it’s less available
- More impulsive if we believe it’s the last one
- Spur someone to act quickly on request without thinking
- EX: Must make change before time expires
7
Q
Principles of influence - Urgency
A
- Works along with scarcity
- Act quickly, don’t think
- Used to gain support
- EX: Consequence will occur unless you take this action right now
8
Q
Principles of influence - Familiarity/Liking
A
- Common friends, someone you know
- Comply with requests from ppl they like/have common ground
- “Liking” leads to trust
- You’ll be helpful b/c you want to be liked
- Effective b/c of desire to establish + maintain social relationships
- EX: Might use humor or connect through shared interests, past events, institutions
9
Q
Principles of influence - Trust
A
- Trust ppl with assigned authority/specific expertise
- Trust follows liking
- Trust the consensus
- Established + played out in idea of reciprocation
- EX: I’m from IT and here to help
10
Q
Pretexting
A
- using made up scenario 2 justify why perp is approaching someone
- used as part of impersonation efforts 2 make perp believable
- Trap = set b4 attack
- Perp is character in situation they create
- Where you work, bank, fam + friends, etc
- Lying to get info
- EX: Congrats! You qualify for 0% interest rates
Prevention
- vic can ask q’s
- vic can require verification
11
Q
Impersonation
A
- Use some details from recon
- Often used with a pretext or invented scenario
- Perp assumes character/appearance of someone else
- Attack vic as someone from higher rank
- EX: You can trust me, I’m with your help desk
12
Q
Recon
A
- Uses public info sources to first do recon of the target
- EX: LinkedIN, company website, etc.
13
Q
Eliciting info
A
- Extracting info from vic/hacking the human
- Can directly/indirectly lead to sensitive data loss
- Might not be immediate consequences but cumulative effect combined could have dire consequences
- Often seen with vishing (easier to get info over phone)
- Vic doesn’t realize it’s happening
14
Q
Identity fraud
A
- Persons personal info used without authorization to deceive/commit a crime
15
Q
Credit card fraud
A
- Open account in your name or use CC info
16
Q
Bank fraud
A
- Gains access to your account or opens new account
17
Q
Loan fraud
A
- Your info is used for loan or lease
18
Q
Government benefits fraud
A
- Obtains benefits on your behalf
19
Q
Impersonation protection
A
- Don’t volunteer info
- Don’t disclose personal details
- Always verify before revealing info (call back/3rd parties)
- Encourage verification
- Ongoing user awareness + education is important
20
Q
Phishing protection
A
- Use security technologies, techniques at client side, server side, and enterprise level
- Always check URL
- Usually something not right with spelling, fonts, graphics
- Prepending
- Best defense = user education