1.8.3 Social Engineering Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Social Engineering

A

The weak point in network security packages is often the people.
Social engineering is a form of attack that involves tricking people into giving away critical information or access details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cold Calling

A

Social engineers often cold call victims and pretend to be from an organisation such as:
A bank.
A utility company.
The social engineer will then ask a victim to confirm their details, so that they can use these details to access their account later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fear

A

Fear is often used to put people off-guard and make them more likely to comply.
Social engineers know that people will make irrational decisions when panicked.
A common attack would be to call someone pretending to be a bank, and ask why they have emptied out their account:
This would panic the victim, who would then want to sign into their account straight away over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Education and Training

A

The most effective means of protection against social engineering is education and training.
People are made aware of the tactics of fraudsters:
This makes it more likely that they will recognise a fraudulent phone call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public awareness campaigns

A

Banks and governments often run public awareness campaigns to educate members of the public about the risks of social engineering.
These often include case studies of what could happen if people do not take care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Company security policies

A

Company security policies include instructions that employees must follow to uphold security.
For example:
Don’t discuss a user account without the user having confirmed their PIN number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing : The Attack

A

Phishing uses fake emails and websites to trick people into giving away their sensitive data.
Emails are sent to thousands of people, claiming to be from a known service such as a bank or utility provider.
Victims are taken to a realistic looking but fake version of the site where they log in. This gives their details to the attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing : Protection against Phishing

A

Never click a link in an email that asks you to update or enter your account details.
Check that the sender’s email address is correct.
Look for clues that the email is not legitimate such as spelling mistakes or generic greetings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly