1.1 Social Engineering Techniques Flashcards
What is it called when somebody attains a password or sensitive information by discretely observing it being entered, often using phone cameras, binoculars, or a telescope?
Shoulder Surfing
Phishing that uses phone calls as a vector
Vishing
This tactic involves spoofing an ip or MAC address, masquerading as a legitimate entity, or spoofing phone, email, and SMS communication in order to attain information
Impersonation
This form of warfare involves traditional forms of warfare as well as the incorporation of the cyber realm in a non-traditional way.
Hybrid Warfare
What is it called when spam is carried out over an instant messenger service?
SPIM
Phishing targeting an important figure or C-Team person in an organization
Whaling
This type of attack uses DNS poisoning to redirect web traffic to a spoofed website in order to install malware
Pharming
This attack type often targets companies who outsource, perform wire xfers, or use suppliers from abroad by creating phony invoices, using C-Team fraud, compromising their email accounts, or impersonating an attorney or trusted person.
Business email compromise (BEC)
What kind of information can be attained from Dumpster Diving?
Credit card info
Receipts
IP Address Lists
Important Names
Addresses
What is the goal of an attacker who uses impersonation to gather data an a person in order to attempt further cyber attacks?
Eliciting Information
Phishing that uses SMS as a vector
Smishing
What is the best way to mitigate and prevent Social Engineering attacks?
Proper employee training and awareness
What is a web server called that has been compromised and is being used to target web traffic in order to deploy malware or collect data?
Watering Hole
This type of attack involves somebody closely following an authorized person into a physical area secured by a badge reader or keypad
Tailgating
This type of campaign, also known as a misinformation operation, involves collecting tactical information, determining key stakeholders, and launching propaganda campaigns, often to gain a competitive advantage
Influence Campaigns