Domain #1 Flashcards

Domain #1 Attacks, Threats, & Vulnerabilities

1
Q

What is Phishing?

A

A form of social engineering in which an attacker asks someone for a piece of information they are missing by making it look like it is a legitimate request from a trusted source. Commonly sent
via email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Signs of Phishing?

A
  • Misspelling in the URL
  • Usually there’s something copied incorrectly
  • Spelling
  • Fonts
  • Graphics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Typo squatting?

A

Domain created based on the misspelling of another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Pretexting?

A

An attacker lies to get information. Pretends to be someone else to persuade another person to give up their information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do attackers use Pretexting to gain information?

A

They use a popular brand or service name to lure you into clicking a link/ providing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Pharming?

A
  • Combines phishing + pharming.
  • An attacker attacks a group of people.
  • Uses malicious code on compromised systems to send
    unsuspecting users to malicious websites.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Vishing?

A

Phishing done over the phone.

Users Voice Over IP (VoIP)–> Technology that allows people to make voice calls using internet connection instead of a phone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Characteristics of Vishing?

A
  • Done over the phone
  • Caller ID spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Smishing?

A

A phishing technique that uses phishing via SMS (text) messages and vishing or phishing via telephone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of Smishing?

A
  • Done by text messages
  • Spoofing
  • Forwards links + asks for personal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do attackers know where to Phish?

A
  • Reonnaissance: Gather info on the victim
  • Background info
  • Social Media
  • Corporate Websites
  • 3rd Party Websites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Spear Phishing?

A
  • Targeted Phishing with inside information
  • Phishing aimed at specific individuals or groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Whaling?

A
  • Type of Spear Phishing
  • Phishing aimed at senior staff and organizational leadership or other high-profile targets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Impersonation?

A

Pretending to be another to gain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do attackers use impersonation?

A

Attackers use details from their reconn. to establish trust & credibility from their victims

Attackers may also use high ranking job titles to urge victims to give information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Eliciting Information?

A
  • A technique used to gather information without targets realizing they are providing it.
17
Q

How is Eliciting done ?

A
  • Vishing (Phone Phising)
  • Psychological techniques –> Making the victims feel at ease
18
Q

What is Identity Fraud?

A

The use of someone elses identity

19
Q

What are types of Identity Fraud?

A
  • Credit card fraud –> Attackers open an account in your name or uses your cc info
  • Bank fraud –> Attacker gains access to your bank account or opens new accounts
  • Loan Fraud –> Your information is used for a loan of lease
  • Government benefits fraud –> Attacker obtains benefits on your behalf
20
Q

What is Dumpster Diving?

A

Looking through trash for clues often in the form of paper scraps—to find users’ passwords and other pertinent information.

21
Q

What are the US laws on Dumpster Diving?

A
  • Legal unless in a restricted area
  • You can’t break the law to gain access to a private location that has a dumpster.
22
Q

What is Shoulder Surfing?

A
  • Watching someone when they enter their username, password, or
    sensitive data.
23
Q

Where is Shoulder Surfing common?

A
  • Airports/ Flights
    -Hallway facing monitors
  • Coffee shops
  • Webcam Monitoring
  • Large Cities
24
Q

How does one prevent Shoulder Surfing?

A
  • Control your input, beware of your surroundings
  • Use privacy filters (privacy screens)
25
Q

What are Hoaxes

A

A threat that doesn’t really exist

26
Q

What are the forms of a Hoax?

A
  • Email
  • Messages on screen
  • Voicemail
27
Q

What are the forms of a Hoax?

A
  • Some hoaxes are disguised as viruses or malware, they aren’t truly viruses or malware
28
Q

What is a Watering Hole Attacks

A

When attackers go through 3rd parties and infect it. The 3rd party is the Watering Hole. The central place where they’re hoping users in the organization they’re attacking will visit.

29
Q

What is Spam?

A

Unwanted, unsolicited email sent in bulk.

30
Q

What forms does Spam take?

A
  • Email, Forums
  • Spam over Instant Messaging (SPIM)
31
Q

What content does Spam contain ?

A
  • Commercial advertising
  • Non-Commercial proselytizing
  • Phising Attempts
32
Q

Why is Spam bad?

A
  • Significant technology issue
  • Security concerns
  • Resource Utilization
  • All of the messages have to be stored somewhere, Spam uses network bandwidth to send messages to users.
33
Q

What is the process of The Watering Hole?

A

Once The Watering Hole is infected, users visit that website & become infected themselves.

34
Q

Managing the spam

A

A Spam management system is used to filter Spam before it reaches the users.

35
Q

How is Spam stopped?

A
  • Mail Gateways –> Unsolicited emails are stopped before it reaches the user
  • Spam filters can filter in the cloud
36
Q

How do you Identify Spam?

A
  • Email Gateway/ Spam filter
  • Allowed list
  • SMTP (simple Mail transfer protocol) Standards checking –> Blocks anything that doesn’t follow RFC Standards (rules for the internet)
37
Q

What are Influence Campaigns?

A
  • Social Engeneering technique to sway public opinion on political & social issues
  • Nation-State Actors –> People who come from countries where the majority of people share the same culture, language & history.

Use advertisements as a way to change the opinion of people who may be reading things online.

38
Q

How does Influencing happen?

A
  • Bad Actors create a bunch of fake accounts
  • The fake accounts create content.
  • Content is posted on various sites
  • Messages online amplifies the scope of who reads/digests the messages
  • Real users share the messages
  • Mass media picks up the story
  • Messages become popular because trusted media outlets share the messages.
39
Q
A