Human Element Security Flashcards

Social engineering and types of attacks

1
Q

HUMINT

A

Information that can be gathered by talking to people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSINT

A

Information collected from publicly available sources such as job posting, and public records.
Some sources of OSINT are resume and job posting, social media, public records, Google hacking, metadata.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Metadata

A

Data about data that can be found in every file like the timestamps or locations, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Geospatial Intelligence(GEOINT)

A

Geographical information typically from satellites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Measurement & Signature Intelligence(MASINT)

A

Measurement and signature data from sensors, such as optical and weather readers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Signal Intelligence(SIGINT)

A

Data gathered by intercepting signals between people and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technical Intelligence (TECHINT)

A

Intelligence about equipment, technology, and weapons often for the purpose of developing countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Financial Intelligence (FININT)

A

Data about financial dealings and transactions of companies and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber Intelligence/Digital Network Intelligence (CYBINT/DNINT)

A

Information gathered from computer systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering

A

Manipulate people to gain information or access to facilities by gaining their trust or pretending to be someone they are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pretexting

A

attacker use information they collected to pretend and act as if they are a manager, customer, reporter, co-worker’s family member, or other trusted person. They create a believable scenario that convince their targets to give up sensitive information or perform actions that usually they don’t for strangers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A

a social engineering technique in which an attacker uses electronic communications such as email, texting, or phone calls to collect the target’s personal information or install malware on their system often by convincing the target to click a malicious link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A

To achieve a higher rate of success, attackers may turn to spear phishing which is targeted attacks against specific companies, organizations, or people. In spear phishing the attacker should plan everything strategically and should observe the target so the message appears to come from someone the target would trust such as human resources staff, a manager, the corporate IT support team, a peer or a friend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tailgaiting/Piggybacking

A

is following someone through an access control point such as secure door, instead of using the credentials, badge, or key normally needed to enter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cunning and flattery

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Impersonating

A

masquerading as someone else such as a repair technician

17
Q

Dumpster Diving

A

Searching through trash to gain information from discarded documents.Literally trash to find documents and devices!

18
Q

Spam emails

A

unsolicited emails, commonly advertising emails, but sometimes phishing and scamming attempts.

19
Q

Email Spoofing

A

is the forgery of an email header so that the email seems to be sent from a legitimate source.

20
Q

Email pharming

A

a user will open an email with malware, which then installs malicious code on the user’s PC. Another way is that the malicious code changes the local hosts file on a personal computer and the code redirects any URL clicks to a fraudulent website without knowledge or consent. The website might look like a familiar website like your bank website and when you enter your username and password, they steal the information. It is pharming data.

21
Q

Protocol spoofing

A

misuse of a network protocol to initiate an attack on a host or network device

22
Q

ARP spoofing

A

Address Resolution Protocol(ARP) helps computers on a network figure out the MAC address of another computer based on its IP address. ARP poisoning modifies the network’s ARP cache to take over a victim’s MAC address. This allows attacker to receive any data intended for the victim.

23
Q

DNS Spoofing

A

Domain Name Service(DNS) translates domain names into IP addresses. In DNS spoofing, the attacker alters the DNS records to redirect traffic to a fraudulent website, where further attacks can occur.

24
Q

IP Address Spoofing

A

is an attack where a malicious user forges a packet’s source IP address and by doing so it impersonates the sending computer.

25
Q

Denial of Service Attack

A

when an attacker floods a server or other network device to make it unavailable. The server will be overwhelmed so it cannot respond to requests.

26
Q

Distributed Denial of Service Attack

A

It is DoS attack that is lunched from a large number of malicious machines.
Common types of DoS and DDoS attacks are:
○ Buffer overflows: Sending the server more data than expected.
○ SYN Attack: Exploits the TCP three-way handshake.
Ping of Death: Exploits the ICMP “ping” protocol.

27
Q

Back door attack

A

When someone creates an alternative way into a system that bypasses its security controls

28
Q

Replay Attack

A

Similar to a man-in-the-middle, but with a replay attack. The attacker will capture a message sent from a network device to the server. Later, the attacker will send the original, unmodified message to the server, hoping the server would respond thinking the attacker is a valid device. If it does, the attacker created a “trusted” relationship with the server.

29
Q

Weak Encryption Key

A

Occurs when enough network traffic is captured to allow the key to be broken. Example: WEP encryption.

30
Q

Software Vulnerability Attack

A

he exploitation of known software vulnerabilities/bugs for malicious purposes.

31
Q

Remote Code Execution Attack

A

When web applications are improperly coded, attackers can run system-lelvel code for malicious purposes.

32
Q

SQL Injection Attack

A

attacker manipulates input forms to pass unauthorized SQL to the SQL server database. This allows attacker to drop tables, obtain data, and delete information.

33
Q

Cross-Site Scripting Attack (XSS Attack)

A

attacker embeds HTML or JavaScript malicious code into a website code. The code executes when a user visits website. Attacker can obtain sensitive data, session cookies and more.