CH29 Social Engineering Flashcards

1
Q

What is Social Engineering?

A

manipulates a user into revealing confidential information that are detrimental to that user or the security of our systems

On the exam :
if they ask what is the act of tricking somebody or deceiving them, that would be social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Insider Threat?

A

Most dangerous threat to organizational security. Insider Threat is a person who works for your organization but has ulterior motives. Employees who steal your information are insider threats.

Data Loss Protection (DLP) systems can be used to help identify insider threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Phishing ?

A

an attempt to fraudulently obtain information from a user (usually by email)

For the exam : Phishing = email

On the exam :
If they say tricking them through email, that would be phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Spear Phishing ?

A

an attempt to fraudulently obtain information from a user, usually by email that targets a specific individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Whaling?

A

a form of spear phishing that directly targets the CEO, CFO, CIO, CSO, or other high-value target in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Smishing?

A

Phishing conducted over text messaging (SMS)

On the exam :
Tricking them through text message, that would be smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Vishing?

A

Phishing conducted over voice and phone calls

On the exam :
Tricking them through voice messages, that would be vishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Pharming

A

Phishing attempt to trick a user to access a different or fake website

On the exam :
Tricking them into going to bad websites, that would be pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are motivation factors for Social Engineering ?

A
  1. Authority – People are more willing to comply with a request when they think it is coming from someone in authority.
  2. Urgency – people are usually in a rush these days and urgency takes advantage of this fact.
  3. Social Proof – People are more likely to click on a link through social media or based on seeing others have already clicked on it.
  4. Scarcity – technique that relies on the fear of missing out on a good deal that is only offered in limited quantities or a limited time.
  5. Likeability – a technique where the social engineer attempts to find common ground and shared interests with their target.
  6. Fear – the use of threats or demands to intimidate someone into helping you in the attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Diversion Theft?

A

when a thief attempts to take responsibility for a shipment by diverting the delivery to a nearby location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Hoax?

A

attempt at deceiving people into believing that something is false when it is true (or vice versa)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Shoulder surfing?

A

When a person uses direct observation to obtain authentication information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Eavesdropping?

A

When a person uses direct observation to “listen” in to a conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Dumpster Diving?

A

when a person scavenges for private information in garbage containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Baiting?

A

when a malicious individual leaves malware-infected removable media such as a USB drive or optical disc lying around in plain view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is PiggyBacking?

A

When an unauthorized person tags along with an authorized person to gain access to a restricted area

17
Q

What is Watering Hole Attack?

A

When an attacker figures out where users like to go, and places malware to gain access to your organization

18
Q

What is Fraud?

A

The wrongful or criminal deception intended to result in financial or personal gain

19
Q

What is Identity Fraud?

A

the use by one person of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person. It involves stealing another person’s identity and using it as your own.

20
Q

What is Scam?

A

a fraudulent or deceptive act or operation

21
Q

What is Invoice Scam?

A

a scam in which a person is tricked into paying for a fake invoice for a service or product that they did not order

22
Q

What is Prepending?

A

a technical method used in social engineering to trick users into entering their username and passwords by adding an invisible string before the weblink they click

The prepended string (data:text) converts the link into a Data URI that embeds small files inline of documents

23
Q

What is Influence Operations?

A

the collection of tactical information about an adversary as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent. You want to use information and use it against someone

24
Q

What is Hybrid Warfare?

A

a military strategy which employs political warfare and blends conventional warfare, irregular warfare and cyberwarfare with other influencing methods, such as fake news, diplomacy, and foreign electoral intervention