Chapter 8 Flashcards
The knowledge and the attention shown by users with physical, logical, and administrative controls
Security Awareness
HUMINT
Human Intelligence
Data gathered by talking to people
Human Intelligence (HUMINT)
OSINT
Open Source Intelligence
Information collected from publicly available sources
Open Source Intelligence (OSINT)
Data about data
Metadata
Measurement and signature data from sensors
Measurement and Signature Intelligence (MASINT)
Data gathered by intercepting signals between people or systems
Signals Intelligence (SIGINT)
Intelligence about equipment, technology, and weapons
Technology Intelligence (TECHINT)
Dara about the financial dealings and transactions of companies and individuals
Financial Intelligence (FININT)
Intelligence gathered from computer syustems and networks
Cyber Intelligence/Digital Network Intelligence (CYBINT/DNINT)
A technique that relies on the willingness of people to help others, particularly when the target is faces with someone that appears to be in distress, someone that is intimidating, or someone that we would normally expect to see in a given situation
Social Engineering
When attackers use information they’ve gathered to assume the guise of a manager, customer, reporter, co-worker’s family member, or other trusted person. Attackers create a fake identity and a believable scenario that convinces their targets to give up sensitive information or perform actions they wouldn’t normally do for strangers
Pretexting
A social engineering technique in which an attacker uses electronic communications such as email, texting, or phone calls to collect the target’s personal information or install malware on their system, often by convincing the target to click a malicious link
Phishing
aka piggybacking
Tailgating
The act of following someone through an access control point, such as secure door, instead of using the credentials, badge, or key normally needed to enter
Tailgating
Any application that makes any unauthorized changes to a device
Malware
A policy that sensitive information is not to be left out on a desk when it is to be unattended for any significant period of time
Clean desk