Chapter 10: Social Engineering and More Flashcards

1
Q

What’s the difference between Social Engineering and Wetware?

A

There is none.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Social Engineering?

A

Gaining access to something by exploiting the general trusting nature of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder Surfing

A

Looking over someone’s shoulder to try and get some information from their computer screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dumpster Diving

A

Looking through dumpsters for important files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tailgating

A

Following closely behind someone to gain access to a room you’re not supposed to be in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A

Pretending to be someone you’re not to gain access to a restricted area, such as a copier repairman or a vending machine stocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hoaxes

A

Warnings about things that aren’t legitimate, such as bomb threats, sounding alarms, or the Goodtimes virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whaling

A

Phishing of big name targets (Dear Bill Gates….)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious Insider Threat

A

A disgruntled employee happy to benefit from the injuring of the company.
<b>Anyone can be bought. Everyone has a price.</b>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authority

Principles Behind Social Engineering

A

Convincing the victim that you’re a person of authority and shouldn’t be questioned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intimidation

Principles Behind Social Engineering

A

Threats, shouting, guilt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Consensus/social proof

Principles Behind Social Engineering

A

Putting the victim at ease and placating them, talking them up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scarcity

Principles Behind Social Engineering

A

Convincing someone that there’s a limited supply of whatever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Urgency

Principles Behind Social Engineering

A

Telling the victim something awful will happen if they don’t hurry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Familiarity/liking

Principles Behind Social Engineering

A

Liking someone can lower our mental guards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trust

Principles Behind Social Engineering

A

Get them to feel they owe you something or that they can trust you

17
Q

Proximity Reader Frequencies

A

Smart Cards-13.56 MHz

Proximity Cards-125 KHz

18
Q

Protected Distribution System (PDS)

A

A system in which physical security is so high that you can forego encryption entirely. If you have WiFi, you’re probably inside a Faraday Cage.

19
Q

Fire Extinguisher Types

A

A-Wood and paper fires -Water or chemical
B-Flammable liquids -Chemical
C-Electrical -nonconductive chemicals
D-Flammable metals -Varies

20
Q

PASS

A

Pull, aim, squeeze, and sweep. That’s how you should operate a fire extinguisher.

21
Q

Faraday Cage

A

Grounds the whole room, electromagnetic signals can’t enter or leave

22
Q

Van Eck Phreaking

A

Detecting electromagnetic emissions from CRT and LCD displays to eavesdrop. This does work!

23
Q

TEMPEST

A

an organization dedicated to reducing noise from devices which can divulge intelligence

24
Q

What humidity level do you need to keep your computers at?

A

50% or higher. Any less than that is an ESD risk.

25
Q

Deterrent

Control Types

A

Anything that tells a would-be attacker that they should be a wouldn’t-be attacker

26
Q

Preventative

Control Types

A

Stopping something from happening (locks, biometrics, knowledge, guards)

27
Q

Detective

Control Types

A

AV, alarm, checksum, motion sensor

28
Q

Compensating

Control Types

A

A backup for when other methods fail

29
Q

Technical

Control Types

A

Firewalls, IDS, IPS….

30
Q

Administrative

Control Types

A

Policies, procedures, and guidelines

31
Q

What four areas should Data Policies be focused on?

A
<b>W</b>iping
-How is data removed from the media?
<b>D</b>isposing
-How is media disposed of?
<b>R</b>etention
-How long must data be kept?
<b>S</b>torage
-Where is data kept, and what security precautions are associated with its access?