Chapter 10 - Social Engineering and Other Foes Flashcards
What are the different types of Social Engineering Attacks?
page 356
- Shoulder Surfing
- Dumpster Diving
- Tailgating
- Impersonation
- Hoaxes
What are the Principles behind Social Engineering?
page 362
- Authority - Trust
- Intimidation - Scarcity
- Consensus/Social Proof - Urgency
- Familiarity/ Liking
At what frequency do the Proximity readers work at?
page 367
For smart cards = 13.56 MHz
For Proximity cards = 125 KHz
What is a man-trap?
page 371
A series of interconnecting interlocks in which one door must close before another is opened.
What is PDS?
page 376
Protected Distribution System
The network is secure enough to allow for the transmission of classified information in unencrypted format.
What is occasionally referred to as Wetware?
page 355
Social Engineering
What helps in decreasing shoulder surfing?
page 357
Privacy filters
What does CERT stand for?
page 359
Computer Emergency Readiness Team
What is Whaling?
page 360
Instead of sending out a “To Whom It May Concern” message, the whaler identifies one person from whom they can gain all the data they want, usually the manager or owner.
What is Vishing?
page 360
Combined with phishing and VoIP, is an elevated form of social engineering
What is the only preventive measure in dealing with Social Engineering?
page 365
Is to educate your users
What are a few things to deter intruders from breaking into your building?
page 373
Install improved door locks
What are the Fire Extinguisher ratings?
page 378 A - Wood and Paper B - Flammable Liquids C - Electrical D - Flammable Metals
What are the most common Fixed Systems for Fire Suppression?
page 379
Combine Fire Detectors with Fire Suppression systems.
What is RF desensitization?
page 381
When RF levels become to high that it can cause receivers in wireless units to become deaf.