Chapter 10 Social Engineering and Other Foes Flashcards
Social engineering
pg.355
the process by which intruders gain access to your facilities, network and even your employees by exploiting the generally trusting nature of people
Impersonation
pg.356
A Particular talent or skill or ability to look like someone else
Shoulder Surfing
pg.356
watching over someones shoulder
Privacy filters
pg.357
go over the screen and restrict the viewing angle to straight on view
Dumpster diving
pg.357
common physical access method, dumpsters may contain information that are highly sensitive in nature
Tailgating
pg.357
A favorite method of gaining entry to electronically locked systems is to follow someone through the door they just unlocked
Hoaxes
pg.358
Issued phony threats to scare users
Whaling
pg.360
phishing or spear phishing but for big users
Vishing
pg.360
combining phishing with Voice over IP
Malicious Insider threat
pg.362
greed driven virus bribed for given information
Authority
pg.362
convincing a person you are attempting to trick that you are in a position of law or higher power
Intimidation
pg.362
Threats with shouting or even with guilt
Consensus/Social Proof
pg.363
Putting the person being tricked at ease by putting the focus on them- listening intently, validating their thoughts charming them
Urgency
pg.363
Not doing something right away
Familiar/Liking
pg.363
Pretending to have, same interest as you