1B Flashcards
___ ___ is a non-technical or low-technology confidence trick (“con”) used for attacking information systems, often involving trickery or fraud.
Social Engineering
Social engineering is commonly known as, “___ ___ ___.”
hacking the human
The purpose of social engineering can be ___ ____, ____ or ____ ____. It differs from a traditional “con” in that it is often one of many steps in a more complex scheme.
information gathering, fraud or system access
What are the two types of social engineering?
Phishing and Baiting
___ techniques attempt to acquire sensitive data, such as bank account numbers, passwords, email accounts, etc., through fraudulent solicitation via email, text messages, or websites. A perpetrator masquerades as a legitimate business or reputable person, often broadcasting messages to a wide audience of targets or individuals within an organization or otherwise. Imagine a fisherman casting a line into the water with a baited hook waiting for a victim to bite.
Phishing
What are the two kinds of phishing?
Spear Phishing and Whaling
___ ___ is a type of phishing that targets a specific group of individuals by sending messages that appeal to the group. Phishers may identify their targets by name using information collected from public sources such as social media. They may email targets using spoofed email addresses that look like those of an organization or service that the targets have a relationship with, such as an employer or government agency. When it comes to ____ ____, imagine a fisherman aiming a spear at a specific group of fish in the water.
Spear Phishing
_____ is a specific form of spear phishing targeted at high-value individuals, such as a CEO or company board member. This type of target provides an especially high payoff for potential attackers
due to the type and amount of information they have access to.
Whaling
_____ tricks a victim by using their curiosity or greed against them. It encourages any user who happens to come across the bait to perform some action to trigger a trap, such as installing malware onto a device.
Baiting
The best countermeasures against social engineering involve _____ yourself and your co-workers in your organization.
educating
What are four ways to mitigate social engineering?
- Email & Attachments - Do not open email messages and/or attachments from suspicious sources
- Multifactor Authentication - In the event of a system or account compromise, multifactor authentication can protect your account
because the attacker would be less likely to have compromised all factors for an account - Antivirus/Antimalware - Enable automatic updates or regularly update antivirus/antimalware programs.
- Use Good Judgement - If an offer looks too good to be true, research it before taking any action. It is likely a scam.