1.1 Social engineering attacks Flashcards

1
Q

What is phishing ?

A

Social engineering with a touch of spoofing (dellivered by mail, ect)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to spot phishing attack ?

A

check the URL, spelling, fonts, graphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How phishing attack are so successful?

A

By trycking us using typosquatting (type of URL hijacking = pretend to be a legitimate URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming and it can be related to phishing?

A

redirection a legit website to a bogus site. It is done by poisonning the DNS server. So the pharming tqke plqce to redirect ppl on the attacker website and phishing take place when the victim enter its credentials. It is difficult to recognise by anti malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Vishing ?

A

Voice phishing is done via phone, qsking for personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to conduct a phishing attack ?

A

1/ Reconnaissance: gather info on the victim
2/ Background info (corporate web site etc)
3/ Attacker builds a believable pretext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spear phishing attack and whaling ?

A

Target phishing with inside information to make the attack more believable. Whaling is a spear phishing attack that target the CEO or CFO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is impersonation ?

A

attackers pretend to be someone they are not, they use info gathered during the reconnaissance phase and pretend to be a person in higher rank to get info on the victims. It can be done via Vishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be the consequences of impersonation ?

A

The attacker can use to victims info fo credit card fraud, bank fraud, loan fraud and government benefit fraud (tax etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to protect against impersonation?

A

nerver give information
verify before revealing info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is dumpster diving attack ?

A

attacker trying to get information by the stuffs you thrown in a trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to prevent from dumpster diving?

A
  • secure the garbage with locker
  • shred your document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is shoulder surfing ?

A

looking over someone shoulder to have access to important info (password, sensitive info etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent shoulder surfing?

A

1/ control your iput and be aware of your surrounding
2/ use privacy filters
3/ keep monitor out of the sight (window etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Hoaxes attack ?

A

a threat that doesn’t actually exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is watering hole attack?

A

computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects

17
Q

How to prevent from watering hole attacks?

A

defense in depth
firewals and IPS
anti-virus/anti malware signature update

18
Q

What is spam ?

A

unsolicited message (email, forum, sms etc) that can be commercial advertising, phishing attempts etc.

19
Q

How to prevent from spam?

A

1/ set up a mail gateway to filter the emails before it is transfered into the internal mail server

20
Q

How to identify a spam?

A
  • set up an allowed list form trusted senders
  • block anything that does not follow RFC standard
    -reverse DNS: block email where sneder’s domain doesn’t match the IP
  • block email not adressed to a valid recipient email adress
21
Q

What is hacking public opinion ?

A

-influence campaign to change ppl opinion, it is enabled with social media (liking, sharing etc)

22
Q

What is the process of hacking public opinion?

A
  • create fake users
    -create contet and post on social media
    -amplify the message
  • real users share the message
    -mass media picks up the story
23
Q

What is hybrid warfare?

A

a type of hacking public opinion attack where a country is trying to influence another country (cyberwar)

24
Q

What is tailgating?

A

use an authorized person to gain unauthorized acces to a building

25
Q

Why social engineering attack are effective?

A
  • constantly changing
  • may involve multiple people
  • may be in person or electronically
26
Q

What are the principle of social engineering?

A
  • use of authority (calling from help desk, CEO etc)
  • intimidation (there will be bad things if you don’t help)
  • consensus/social proof
    -scarcity and urgency (that need to be done immediatly)