Chapter 10 Flashcards
What kind of social engineering is setting off a fire alarm?
Hoax
359
Whaling
Phishing / Spear Phishing
Identifies and targets one person in a phishing message
360
Vishing
Phishing with VoIP
VoIP calls can be untraceable. Using phishing in combination for social engineering purposes can be a deadly combination
360
The only real method for preventing social engineering
Training! Educate people not to fall for it
356-362
Forms of social engineering
Shoulder Surfing Dumpster Diving Tailgating Impersonation Hoaxes Whaling Vishing 356-360
Principles behind social engineering
Authority Intimidation Consensus/ Social Proof Scarcity Urgency Familiarity Trust 362-363
Minimum amount of barriers
Three:
External Entrance
Locked Doors protecting the computer center
Entrance to the computer room itself
Proximity Reader
any ID or card reader capable of reading capable of reading proximity cards
The readers work with 13.56 MHz smart cards and 125 kHz proximity cards
Cable Lock
a physical lock that prevents someone from picking it up and walking away with a copy of the computer database
369
What are those hooks for on the back of a desktop computer?
So you can add a padlock to keep troublemakers from accessing the motherboard
369-370
Camera Vs Guard
Camera is always running and can provide evidence in the event of a theft
Guard can be proactive and use critical thinking to prevent theft and gather evidence while it is fresh
372
First line of defense
Perimeter security. True whether physical or technological
372
Access List
Similar to an ACL, but in the real world
A list of people who have physical access to an area
Lighting and Security
It can scare away intruders
Cannot apply facial recognition without it
374
PDS
Protected Distribution System
Where the network is secure enough to allow for the transmission of classified information in unencrypted format
376