Chapter 11 - Low Tech Social Engineering, Physical Security Flashcards

1
Q

ECC Defines 4 Phases of Social Engineering

A

Research (dumpster dive, websites, etc)
Select the victim (id frustrated employee, etc)
Develop a relationship
Exploit the relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ECC 5 Reasons why social engineering works

A

human nature (trusting)

ignorance of social engineering efforts

fear (of consequences of not complying with SE)

greed (promised gain from the SE)

sense of moral obligation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ECC 4 factors that allow social engineering to happen

A

insufficient training

unregulated information (or physical) access

complex organizational structure

lack of security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 types of social engineering attacks

A

human

computer

mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trash Intelligence, TRASHINT

A

ECC considers dumpster diving as social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A

Social Engineer pretends to be someone else that the target either:

respects
fears
trusts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authority Support

A

Attacker poses as a user, calls help desk and requests a password reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tailgating vs Piggybacking

A

Tailgating - attacker has fake badge and follows someone through the door

Piggybacking - attacker doesn’t have a badge, and asks someone to let them in anyway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RFID Skimming

A

cloning an RFID access card or credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reverse Social Engineering

A

Attacker gets target to call them with information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 steps of reverse Social Engineering

Advertisement
Sabotage
Support

A

Advertisement - attacker advertises his position as technical support of some kind

Sabotage - attacker pulls cables, performs DoS or something else to interrupt the target’s service

Support - target calls technical support and attacker “helps” by getting login credentials and gaining access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Items that may indicate a phishing email

beware unknown, unexpected, suspicious originators

beware whom the email is addressed to

Verify phone numbers

beware bad spelling/grammar

always check links

A

if you don’t know the sender, be cautious. If you know the sender and the message is out of context, be cautious

companies typically address you personally

if you see a phone number in the email, call it to verify it’s legitimate

professional email won’t have misspelled words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A

Targeted phishing against an individual or small group of individuals

Result of reconnaissance and a specially crafted email

Most successful SE attack globally. Because attacker has a small audience, it’s easier to craft an email to them

ex. you learn about a shipping and receiving clerk and craft an email to look like a bill of lading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whaling

A

spear phishing against a high-level target, like a CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Chat or Messenger channels usage for SE

A

Used to find out personal information and spread malicious code and install software

IRC is one of the main ways that zombie computers are manipulated by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mitigating Social engineering

A

multiple layers of defense

change management procedures

strong authentication

Best is to train users, especially tech support staff

17
Q

Mobile-based social engineering attacks

A

take advantage of mobile devices, applications or services to carry out their goal

18
Q

ZitMo (Zeus in the Middle)

A

Android malware that captured the phone; target installed application thinking it would receive security messages, but it was a way for attacker to receive their SMS authentication factor

19
Q

Mobile malware for profit

A

malware activated SMS message from victim’s phone that requested premium services. Attacker deletes return SMS messages acknowledging charges.

20
Q

ECC’s 4 categories of mobile SE attacks

publishing malicious apps
repackaging legitimate apps
fake security applications
SMS

A

publishing malicious apps
attacker creates app that’s similar to legitimate apps

repackaging legitimate apps
attacker modifies legitimate app to contain malware, posting it on 3rd party app store. Happened to Angry Birds

fake security applications
Attacker infects PC with malware, uploads malicious app to app store. When user logins in, malware popup says to download bank security software. User complies and infects mobile device

SMS
attacker sends SMS texts that look like legitimate security notifications, with a phone number. Target calls number and provides sensitive data

21
Q

ECC Term - “smishing”

A

SMS phishing

same as 4th category of mobile SE attack

22
Q

Physical Security

A

Plans, Procedures, steps taken to protect assets from deliberate or accidental events that could cause damage or loss

Not just locks and gates. Also protection from floods, earthquakes, theft, vandalism, etc.

23
Q

3 components of physical security (exam tip)

physical
technical
operational

A

physical - all things you can touch, taste, smell or get shocked by. Bollards, lights, fences, locks, parking areas, guards

technical - technological measures that protect at the physical level. Authentication and Permissions as smart cards and biometrics.

operational - policies and procedures, background checks, risk assessments, key management and storage policies

24
Q

Examples of physical considerations for physical security

A

taking out the AC can DoS your entire network

dust, humidity, static electricity, temperature

positive air pressure in data center reduces contaminates

25
Q

Examples of technical considerations for physical security

A

PIN and proximity card. biometrics.

26
Q

Examples of operational considerations for physical security

A

who controls the physical keys, where are they, and how are they managed?

27
Q

Access Control Types

A

biometrics
ID / Entry cards
door locks
man traps

28
Q

Biometrics

A

pros - hard to fake them

cons - easy for system to read false negatives and reject legitimate access

29
Q

False Rejection Rate (FRR)

A

FRR

percentage of time a biometric reader denies access to legitimate user

30
Q

False Acceptance Rate (FAR)

A

FAR

percentage of time an unauthorized user is granted access by the system

31
Q

Crossover Error Rate (CER)

A

the point where FRR and FAR intersect on a graph

a ranking methods to determine how well the system works overall

The lower the number, the better the ranking