Chapter 10: Social Engineering and More Flashcards
What’s the difference between Social Engineering and Wetware?
There is none.
What is Social Engineering?
Gaining access to something by exploiting the general trusting nature of people
Shoulder Surfing
Looking over someone’s shoulder to try and get some information from their computer screen.
Dumpster Diving
Looking through dumpsters for important files
Tailgating
Following closely behind someone to gain access to a room you’re not supposed to be in
Impersonation
Pretending to be someone you’re not to gain access to a restricted area, such as a copier repairman or a vending machine stocker
Hoaxes
Warnings about things that aren’t legitimate, such as bomb threats, sounding alarms, or the Goodtimes virus.
Whaling
Phishing of big name targets (Dear Bill Gates….)
Malicious Insider Threat
A disgruntled employee happy to benefit from the injuring of the company.
<b>Anyone can be bought. Everyone has a price.</b>
Authority
Principles Behind Social Engineering
Convincing the victim that you’re a person of authority and shouldn’t be questioned
Intimidation
Principles Behind Social Engineering
Threats, shouting, guilt
Consensus/social proof
Principles Behind Social Engineering
Putting the victim at ease and placating them, talking them up
Scarcity
Principles Behind Social Engineering
Convincing someone that there’s a limited supply of whatever
Urgency
Principles Behind Social Engineering
Telling the victim something awful will happen if they don’t hurry
Familiarity/liking
Principles Behind Social Engineering
Liking someone can lower our mental guards