1.1 Compare and contrast different types of social engineering tecchniques Flashcards

1
Q

The process of attempting to obtain sensitive information in electronic communications.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A social engineering attack that occurs over or through text messaging services.

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing done over any telephony or voice communication system.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any type of email that is undesirable and/or unsolicited.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The transmission of unwanted communications over any messaging system that is supported by or occurs over the Internet.

A

Spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A more targeted form of phishing where the message is crafted and directed specifically to an individual or group of individuals.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The act of digging through trash to obtain information about a target organization or individual.

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The observation of another users keyboard or viewing another users display.

A

Shoulder Surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The malicious redirection of a valid website’s URL or IP address to a fake website that hosts a false version of the original valid site.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When an unauthorized entity gains access to a facility under the authorization of a valid worker but without their knowledge.

A

Tailgaiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The activity of gathering or collection information from systems or people.

A

Eliciting Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A form of spear phishing that targets specific high-value individuals, such as the CEO or other C-level executives, administrators, or high-net worth clients.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The adding of a term, expression, or phrase to the beginning or header of some other communication.

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When you falsely claim to be someone else through the use of stolen information from the victim.

A

Identity Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A social engineering attack that attempts to steal funds from an organization or individuals through the presentation of a false invoice often followed by strong inducements to pay.

A

Invoice Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The activity of collecting or stealing account credentials.

A

Credential Harvesting

17
Q

Collecting information about a target, often for the purposes of figuring out the best plan of attack against that target.

A

Reconnaissance

18
Q

A form of social engineering designed to convince targets to perform an action that will cause problems or reduce their IT security.

A

Hoax

19
Q

The act of taking on the identity of someone else

A

Impersonation

20
Q

A form of targeted attack against a region, a group, or an organization. It’s waged by poising a commonly accessed resource.

A

Watering Hole Attack

21
Q

A practice employed to capture and redirect traffic when a user mistypes the domain name or IP address of an intended resource.

A

Typosquatting

22
Q

A false statemen crafted to sound believable to convince you to act or respond.

A

Pretexting

23
Q

Social engineering attacks that attempt to guide, adjust, or change public opinion, often waged by nation-states against their real or perceived foreign enemies.

A

Influence Campaigns

24
Q

The combination of classical military strategy with modern capabilities, including digital influence campaigns, psychological warfare efforts, political tactics, and cyber warfare capabilities.

A

Hybrid Warfare (non-linear warfare)

25
Q

Principles of Social Engineering

A

Authority, intimidation, consensus, scarcity, familiarity, trust, and urgency

26
Q

A form of spear phishing that is often focused on convincing members of accounting to transfer funds, pay invoices, or purchase products from a message that appears to originate from a boss, manager, or executive.

A

Business Email Compromise (BEC)

27
Q

When an unauthorized entity gains access to a facility under the authorization of a valid worker by tricking the victim into providing consent.

A

Piggybacking

28
Q

The act of stealing someone’s identity. This can refer to the initial act of information gathering or elicitation. This can also refer to when those stolen credentials and details are used to tale over someone’s account.

A

Identity Theft

29
Q

The practice of displaying a link or advertisement that looks like that of a well-known product, service or site, but when clicked redirects the user to an alternate location, service or product.

A

URL Hijacking

30
Q

A means to redirect a user’s click or selection on a web page to an alternate often malicious target instead of the intended and desired location.

A

Clickjacking

31
Q

A form of attack in which the attacker takes over an existing communication session.

A

Session Hijacking (TCP/IP Hijacking)

32
Q

The collection of information about an individual or an organization to disclose the collected data publicly for the purpose of changing the perception of the target.

A

Doxing

33
Q

A form of attack that exploits human nature and human behavior.

A

Social Engineering