Chapter 1 Social Engineering Techniques Flashcards

1
Q

Social Engineering

A

An attack against a user and typically involves some form of social interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

A type of social engineering in which an attacker attempts to obtain sensitive information by pretending a trusted entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smishing

A
  • A version of Phishing Attack that uses Short Message Service (SMS).
  • The attacks sends the user a link to click which begins the nex phase of the attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vishing

A
  • Attackers using voice simulated technology to obtain information over voice communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SPAM

A
  • Bulk of unsolicited emails.
  • One should always consider the source before clicking any links or directly responding.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SPIM (Spam over Instant Message)

A
  • Spam message delivered via an instant message.
  • Purpose is getting an unsuspecting user to click malicious content or links to initiate an attack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear Phising

A

Targets a specific person or group of people with something in common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster Diving

A

Going through the victim’s trash in hopes of finding valuable information that be used in a penetration attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shoulder Surfing

A

The attacker directly observes the individual entering sensitive information on a form, keyboard, or keypad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Consists of misdirecting users to fake websites made to look official.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tailgating

A

The simple tactic of following closely behind a person who has just used their own access card or pin to gain physical access to a room or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Eliciting Information

A

Posing as a trusted entity, an attacker can get a password reset, information about some system, or other useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whaling

A

Where the target is a high value person, such as a CEO or CFO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Prepending

A

The act of supplying information that another will act upon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity Fraud

A
  • The use of fake credentials to achieve an end
  • Can be done online
  • Works when the person is expecting the person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Invoice Scams

A
  • An attack to get the company to pay for things it has not ordered.
17
Q

Credentials Harvesting

A
  • Involves the collection of credential information such as user IDs, passwords, etc
  • The objective is to obtain credentials.
18
Q

Reconnaissance

A
  • An adversary will examine the systems they intend to attack.
  • This is performed via online research or directly manipulating people to gain information.