5 - Human Aspects in Cyber Security Flashcards

1
Q

Social Engineering

A

Manipulate people to execute an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Lifecycle for Social Engineering

A
  • Information Gathering
  • Relationship Development
  • Exploitation
  • Execution to achieve the objective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Gathering methods

A
  • Reconnaissance (social media, public info etc)
  • Public info
  • Social media
  • Dumpster diving
  • Cold Calling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Impersonation

A

Impersonating a TRUSTED member in regards to security and tech etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 Common Social Media Scams

A
  • Fake logins, articles, groups etc
  • Catfishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Road Apples

A

Eg bait with desirable info.

Aim to get user to open it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pretexting

A

inventing a scenario to gain access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

Emails/phone calls that appear legitimate with a sense of urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shoulder Surfing

A

Someone “eyeing” sensitive information without the person realising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dumpster Diving

A

Going through someone’s rubbish/trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 Data classifications

A

Public Use
Internal Use
Confidential
Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 examples of Access Segregation

A

Controls
MFA
Restrict physical access
Guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are screensavers useful?

A

They can be used to repeatedly remind users of policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly