Compare and contrast different types of social engineering techniques. Flashcards

1
Q

SOCIAL ENGINEERING

A

an attempt by an attacker to convince someone to provide info (like a password) or
perform an action they wouldn’t normally perform (such as clicking on a malicious link)
Social engineers often try to gain access to the IT infrastructure or the physical facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PHISHING

A

commonly used to try to trick users into giving up personal information (such as user
accounts and passwords), click a malicious link, or open a malicious attachmen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SPEAR PHISIHING

A

Targets specific groups of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHALING

A

targets high-level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VISHING

A

voice phishing (phone based)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMISHING

A

uses sms(text) messaging on mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SPAM

A

Unsolicited email, generally
considered an irritant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SPIM

A

SPAM over instant messaging, also
generally considered an irritant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DUMPSTER DIVING

A

Gathering important details (intelligence) from
things that people have thrown out in their TRASH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TAILGATING

A

when an unauthorized individual might
follow you in through that open door
without badging in themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ELICITING INFORMATION

A

strategic use of casual conversation
to extract information without the
arousing suspicion of the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SHOULDER SURFING

A

a criminal practice where thieves
steal your personal data by spying
over your shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHARMING

A

an online scam similar to phishing, where
a website’s traffic is manipulated, and
confidential information is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDENTITY FRAUD

A

use of another person’s personal information,
without authorization, to commit a crime or to
deceive or defraud that person or other 3rd party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PRENPENDING

A

Prepending is adding words or phrases like “SAFE”
to a malicious file or suggesting topics via social
engineering to uncover information of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

INVOICE SCAMS

A

fake invoices with a goal of receiving money or
by prompting a victim to put their credentials
into a fake login screen

17
Q

CREDENTIAL HARVESTING

A

attackers trying to gain access to your
usernames and passwords that might be
stored on your local computer

18
Q

HOAXES

A

Intentional falsehoods coming in a variety of forms ranging from virus
hoaxes to FAKE NEWS. Social media plays a prominent role in hoaxes today

19
Q

WATERING HOLE ATTACK

A

Attack strategy in which an attacker guesses or observes which websites an
organization often uses and infects one or more of them with malware

20
Q

TYPOSQUATTING

A

a form of cybersquatting (sitting on
sites under someone else’s brand or
copyright) targeting users who type
an INCORRECT WEBSITE ADDRESS

21
Q

PRETEXTING

A

an attacker tries to convince a victim to give up
information of value, or access to a service or system. LYING

22
Q

HYBRID WARFARE

A

Attack using a mixture of conventional and unconventional
methods and resources to carry out the campaign

23
Q

INFLUCENCE CAMPAIGNS

A

A social engineering attack intended to manipulate
the thoughts and minds of large groups of people

24
Q

PRINCIPLES OF SOCAIL ENGINEERING

A

Authority - position
Intimidation - negative outcomes
Consensus - peer
Scarcity - quantity
Familiarity -liking
Trust - knowledge and experience
Urgency - Time sensitiv
Urgency