1.1: Compare and contrast different types of social engineering techniques.  Flashcards

1
Q

An attack exploiting human nature and behavior.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering, employed to obtain sensitive/private information. Can be any communication means.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing occurring over std. text msg service/app

A

Smishing (SMS phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing done via voice communication system. Includes traditional phone lines, VoIP, and mobile devices.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any type of email unsolicited and/or undesired

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unwanted communications over a messaging system via internet.

A

Spam over instant messaging (SPIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

More targeted form of phishing where message is crafted and directed to a specific group of individuals

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digging through trash/discarded materials for information on a target

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When someone is able to watch another user’s display/keyboard

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious redirection of a valid URL or IP to a fake website hosting a false version of the original destination.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When an unauthorized person enters a facility under authorization of a valid member w/o their knowledge

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Activity of gathering info from systems or people

A

Eliciting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Form of spear phishing, targeting high-value individuals (CEO, etc.)

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where malicious characters or code are added at the beginning of a legitimate file, string, or command.

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Act of stealing ones identity. Can refer to initial act of info gathering or when stolen info is used to take one’s account.

A

Identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering attack that attempts to steal funds from an org. using a false invoice.

A

Invoice scams

17
Q

Activity of gathering and stealing account credentials.

A

Credential harvesting

18
Q

Gathering information about a target, generally prior to an engagement/attack

A

Reconnaissance

19
Q

A fake warning about a virus or other piece of malicious code.

A

Hoax

20
Q

Act of taking on the identity of someone to use their access/authority. Masquerading, spoofing, and identity fraud

A

Impersonation

21
Q

Attacker observation of victim habits to discover a common resource that one or more members of the target use, then infecting that resource

A

Watering hole attack

22
Q

Using mistypes of intended resources as malicious sources.

URLs and IP address typos leading to a malicious site is an example.

A

Typosquatting

23
Q

False statement crafted to sound believable attempting at convincing to act or respond

A

Pretexting

24
Q

Collection of info about an individual or org to disclose data publicly.

A

Doxing

25
Q

Social engineering attacks attempting to guide, adjust, or change public opinion

A

Influence campaigns

26
Q

Convincing the target the actor has authority over them

A

Authority

27
Q

Uses authority, confidence, or threat of harm to motivate a victim to follow orders

A

Intimidation

28
Q

Taking advantage of people’s tendency to mimic what others are doing, convincing the victim a particular action/response is consistent w/social norms or previous occurrences

A

Consensus

29
Q

Convincing the target an object has a higher value based on limited availability.

A

Scarcity

30
Q

Appearing to have common contact/relationship w/the target, or assuming the identity of that familiar contact

A

Familiarity

31
Q

Building a relationship w/ the victim to convince them to reveal information/perform an action

A

Trust

32
Q

The need to act quickly on the basis of a limitation of time

A

Urgency