2.5 Compare and contrast social engineering, threats, and vulnerabilities. Flashcards

1
Q

• Social engineering

A

Social engineering refers to means of getting users to reveal this kind of confidential information or allowing some sort of access to the organization that should not have been authorized.

A social engineering attack uses deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines.

Social engineering is often a precursor to another type of attack. It is also important to note that gaining access to a network is often based on a series of small steps rather than a single large step. That is, knowing the email address of an employee allows an attacker to search for facts about that user online. This might help target the user with fake messages.

A message might be convincing enough to persuade the user to reveal some confidential information or install some malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Phishing
A

The practice of sending emails to A Bunch of users with the purpose of tricking them info revealing personal information, OR clicking on a link.

A Phishing attack often sends the user to a malicious website that appears as the legitimate site….

Ex. ebay, bank, “we noticed suspicious activity on your account, plese click to ;login and fix…“…..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Spear phishing
A

Spear phishing is the term used for targeted attacks, like when a bad guy goes after a specific celebrity.

The dangerous thing about spear phishing is that the bait can be carefully tailored using details from the target’s life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Impersonation
A

Impersonation (pretending to be someone else) is one of the basic social engineering techniques.

EXAMPLE: classic impersonation attack is for an attacker to phone into a department, claim they have to adjust something on the user’s system remotely, and get the user to reveal their password….

  • Intimidate their target by pretending to be someone senior in rank.
  • Intimidate the target by using spurious technical arguments and jargon or alarm them with a hoax.
  • Coax the target by engaging with them in and putting them at their ease.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Shoulder surfing
A

Refers to stealing a password or PIN, or other secure information, by watching the user type it. May be in person, video or drone surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating

A

Or (piggybacking) is a means of entering a secure area without authorization by following close behind the person – who is allowed to open the door or checkpoint. They sneak in behind you…. OR “forgot my badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Dumpster diving
A

A social engineering technique of discovering things about an organization (or person) based on what it throws away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

• DDoS

A

distributed denial of service (DDoS) attacks that use many machines simultaneously to assault a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• DoS

A

A denial of service (DoS) attack uses various methods to overwhelm a system, such as a Web server, to make it essentially nonfunctional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

• Zero-day

A

the Zero-day attack, which occurs an attack comes out or is exploited the SAME Day a bug or issue or vulnerability is announced to the public-

there is NO known patch or fix yet- and hackers take advantage of and attack… .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Man-in-the-middle

A

A man-in-the-middle attack (MITM attack) is a cyber attack where an attacker relays and possibly alters communication between two parties who believe they are communicating directly.

This allows the attacker to relay communication, listen in, and even modify what each party is saying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

• Brute force

A

Where someone tries to guess the passphrase to the network.

Often using the default user accounts- like admin/guest/etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• Dictionary

A

a Password attack that uses a file of words and character combinations. the attack tries every entry within the file while trying to guess a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Rainbow table

A

A file containing precomputed hashes for character combinations. rainbow tables or use to discover password.

This method can have that password cracked in less than three minutes. You’ve got a hash of the password, you’re not guessing the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spoofing

A

also referred to as masquerading, as is impersonation. And they can spoof just about anything these days, guys.

They’ll spoof MAC addresses, they’ll spoof IP addresses, they’ll spoof the ARP response.

They’ll spoof the Referrer - like google for example, and that’s spelled right for the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• Non-compliant systems

A

Non-compliant systems are Legacy/Non-compliant systems, ARE a HUGE security risk for a number of reasons, if you’ve got older legacy systems in your place.

May be a threat to your business’ future. Your competition is moving everything to a hyper-responsive cloud data center.

17
Q

• Zombie

A

computers that are compromised and are under a hacker’s control.

They’re commonly used maliciously for things like distributed denial-of-service attacks,

18
Q

WINDOWS Host File

A

is Malwarebytes’ generic detection name for undesirable changes made in the Windows hosts file on the affected system.

The Windows hosts file is the first step in the process to resolve DNS queries, so it can be used to hijack internet traffic to different IP addresses.