Chapter 10 Flashcards
What kind of social engineering is setting off a fire alarm?
Hoax
359
Whaling
Phishing / Spear Phishing
Identifies and targets one person in a phishing message
360
Vishing
Phishing with VoIP
VoIP calls can be untraceable. Using phishing in combination for social engineering purposes can be a deadly combination
360
The only real method for preventing social engineering
Training! Educate people not to fall for it
356-362
Forms of social engineering
Shoulder Surfing Dumpster Diving Tailgating Impersonation Hoaxes Whaling Vishing 356-360
Principles behind social engineering
Authority Intimidation Consensus/ Social Proof Scarcity Urgency Familiarity Trust 362-363
Minimum amount of barriers
Three:
External Entrance
Locked Doors protecting the computer center
Entrance to the computer room itself
Proximity Reader
any ID or card reader capable of reading capable of reading proximity cards
The readers work with 13.56 MHz smart cards and 125 kHz proximity cards
Cable Lock
a physical lock that prevents someone from picking it up and walking away with a copy of the computer database
369
What are those hooks for on the back of a desktop computer?
So you can add a padlock to keep troublemakers from accessing the motherboard
369-370
Camera Vs Guard
Camera is always running and can provide evidence in the event of a theft
Guard can be proactive and use critical thinking to prevent theft and gather evidence while it is fresh
372
First line of defense
Perimeter security. True whether physical or technological
372
Access List
Similar to an ACL, but in the real world
A list of people who have physical access to an area
Lighting and Security
It can scare away intruders
Cannot apply facial recognition without it
374
PDS
Protected Distribution System
Where the network is secure enough to allow for the transmission of classified information in unencrypted format
376
Security Zone
Where access is individually monitored and controlled.
376
Motion Detection
system can monitor a location and signal an alarm if it picks up movement. Can use infrared, microwave, and/or sonic sensors
376
Fire Extinguisher Ratings. What are they for?
A. Wood and Paper B. Flammable Liquids C. Electrical D. Flammable Metals 378
Fire Extinguisher Ratings. What do they use?
A. Largely Water / Chemical B. Fire-Retardant chemicals C. Nonconductive chemicals D. varies 378
PASS method
procedure for using a fire extinguisher
Pull Aim Squeeze Sweep 379
Fixed Systems
Fire Detectors and Fire Suppressant system
If the sprinklers detect smoke, they spray water/fire suppressant gas
379
Major concern with electrical fires
They’re usually still plugged in. Hazard can recur
379
Drawbacks of gas based systems
Require sealed environments
Expensive
Displaces oxygen in the room… suffocation
380
Perks of gas based systems
Does not damage computer systems
380
Faraday Cage
can provide electrical shielding surrounding a computer room. To prevent outside communication
380
Desensitizing
If RF levels are too high, it can cause wireless units to become deaf even if the signals are on different frequencies.
381
Hot and Cold Aisles
Providing constant circulation in a server room by alternating the tempurture of the aisles
382