Chapter 8 Flashcards
The knowledge and the attention shown by users with physical, logical, and administrative controls
Security Awareness
HUMINT
Human Intelligence
Data gathered by talking to people
Human Intelligence (HUMINT)
OSINT
Open Source Intelligence
Information collected from publicly available sources
Open Source Intelligence (OSINT)
Data about data
Metadata
Measurement and signature data from sensors
Measurement and Signature Intelligence (MASINT)
Data gathered by intercepting signals between people or systems
Signals Intelligence (SIGINT)
Intelligence about equipment, technology, and weapons
Technology Intelligence (TECHINT)
Dara about the financial dealings and transactions of companies and individuals
Financial Intelligence (FININT)
Intelligence gathered from computer syustems and networks
Cyber Intelligence/Digital Network Intelligence (CYBINT/DNINT)
A technique that relies on the willingness of people to help others, particularly when the target is faces with someone that appears to be in distress, someone that is intimidating, or someone that we would normally expect to see in a given situation
Social Engineering
When attackers use information they’ve gathered to assume the guise of a manager, customer, reporter, co-worker’s family member, or other trusted person. Attackers create a fake identity and a believable scenario that convinces their targets to give up sensitive information or perform actions they wouldn’t normally do for strangers
Pretexting
A social engineering technique in which an attacker uses electronic communications such as email, texting, or phone calls to collect the target’s personal information or install malware on their system, often by convincing the target to click a malicious link
Phishing
aka piggybacking
Tailgating