Attacks, Threats, Vulnerabilities Flashcards
The Principle Behind Social Engineering.
What are they?
Authority
Intimidation
Consensus / Social Proof
Scarcity
Urgency
Familiarity / Liking
Trust
The Principle Behind Social Engineering:
Explain Authority?
Convincing a target that they have the authority in the situation so they can act a certain way.
You are trying to entice the target that you have the authority (manager, high level person) asking them to do something.
The Principle Behind Social Engineering:
Explain Intimidation?
A principle that attacker would use on a target to cause apprehension.
They will try to install fear on the target so they can they act or do what they want them to do.
Ex. Telling someone they will go to jail if they don’t do what is being told of them to do.
The Principle Behind Social Engineering:
Explain Consensus/Social Proof?
Meaning that if the attacker can convince a target that others are also doing it, then they should also do it.
Ex. Monkey See Monkey do.
F.O.M.O. - Fear of missing out
The Principle Behind Social Engineering:
Explain Scarcity?
Supply and demand.
When the attacker tells the target that things are in short supply and should act fast. People may want it more when things are in low supply.
Ex. There is only 2 left on this thing at this price… act now.
The Principle Behind Social Engineering:
Explain Urgency?
Time…
Act now or it will be gone forever and not think about the consequences.
Ex. Cash settlement with a link that only has limited time to act
The Principle Behind Social Engineering:
Explain Familiarity/Liking?
Establishing a place of comfort.
When attacker craft a thing in a way that will interest you that make you feel comfortable.
The more comfortable the target gets, the likely that they will do what the attacker is asking them to do.
The Principle Behind Social Engineering:
Explain Trust?
Give the target a pathway to think that they are doing what is right at that moment.
What are some social engineering techniques?
Pretexting
Impersonation
Reconnaissance
Explain the pretexting social engineering technique?
When the attacker crafts a fake scenario that sounds legit.
As long as the scenario is believable, someone can fall in this trap.
Explain the impersonation social engineering technique?
Preventing to be someone you are not.
Explain the reconnaissance social engineering technique?
Is the process of building up information that is specific of the target. It can be both digital and in person.
What is Spam?
Unsolicited emails sent to many recipients.
Mostly a nuisance but can be a security concern. (links or attachments)
What is Spim?
Is like Spam but sent over SMS (text messages) or VoIP
What is Phishing?
It’s a email based attack used by social engineers to induce people to give up personal info such as passwords or financial data.
What is the CIA Triad?
Confidentiality / Integrity / Availability
What does Confidentiality mean?
Ensures that unauthorized individuals are not able to gain access to sensitive information.
What does integrity mean?
Ensures that there is no unauthorized modifications to information or system whether intentionally or unintentionally.
What does Availability mean?
Ensures that information and systems are ready to meet the need of users when requested.
What are the 3 key threats to cybersecurity programs?
Disclosure / Alteration / Denial
What does Disclosure mean?
D.A.D Triad.
Sensitive data or systems are exposed to unauthorized individuals.
Also known as DATA LOSS.
What does Alteration mean?
D.A.D Triad.
The unauthorized modification of information whether internally or unintentionally.
What does Denial mean?
D.A.D Triad.
The disruption of authorized users access to information or systems.
What is a Financial Risk?
the rest of monetary damage to the organization as a the results of the data breach or destruction of physical buildings.
What is a Reputational risk?
When negative publicity surrounding a security breach causes the loss of trust among anyone associated with the business.
What is Strategic Risk?
The risk that a company will become less effective in meeting its major goals due to the breach.
Ex. Losing laptop with the only copy of a new product or competitors gaining your info of a new product.