Chapter 1 Flashcards

1
Q

Social Engineering

A

attack against a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Best defense against Social Engineering?

A

user awareness & education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

most common by pretending to be a trusted entity like email or instant message to gain sensitive information from user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tailgating

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dumpster Diving

A

looking for discarded information and equipment to gain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shoulder Surfing

A

looking over someone’s shoulder to gain info. Ex. In a crowded area peering over shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

SMS message designed to trick victim to a link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vishing

A

fake caller ID to get account details over phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SPIM

A

Spam sent over Instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whaling

A

phishing attempts on high level targets like CEO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spear phishing

A

targeting a specific person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Watering Hole Attacks

A

attacking a site target frequently visits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Typo Squatting

A

URL Hijacking. using typo errors to direct to malicious site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A

supplying info that one will act on in attempt to legitimize request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hoax

A

presenting a threat that doesn’t exist causing an action that weakens security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Credential Harvesting

A

phishing attempt causing one to click a link presenting a look-a-like page where the victim enters sensitive information.

16
Q

Principles of Influence

A

> Authority-using symbols of authority makes one feel obligated to comply.
Intimidation- using this to make target fear getting into trouble or fired.
Consensus-use of trusted peers to elicit response “safety in numbers”.
Scarcity/Urgency- “FIrst 50 callers…” or taking immediate action will prevent severe consequences/.
Familiarity-getting victim to like them
Trust- gaining victims trust.