Human Element Security Flashcards
Social engineering and types of attacks
HUMINT
Information that can be gathered by talking to people.
OSINT
Information collected from publicly available sources such as job posting, and public records.
Some sources of OSINT are resume and job posting, social media, public records, Google hacking, metadata.
Metadata
Data about data that can be found in every file like the timestamps or locations, etc.
Geospatial Intelligence(GEOINT)
Geographical information typically from satellites.
Measurement & Signature Intelligence(MASINT)
Measurement and signature data from sensors, such as optical and weather readers.
Signal Intelligence(SIGINT)
Data gathered by intercepting signals between people and systems.
Technical Intelligence (TECHINT)
Intelligence about equipment, technology, and weapons often for the purpose of developing countermeasures.
Financial Intelligence (FININT)
Data about financial dealings and transactions of companies and individuals.
Cyber Intelligence/Digital Network Intelligence (CYBINT/DNINT)
Information gathered from computer systems and networks.
Social Engineering
Manipulate people to gain information or access to facilities by gaining their trust or pretending to be someone they are not.
Pretexting
attacker use information they collected to pretend and act as if they are a manager, customer, reporter, co-worker’s family member, or other trusted person. They create a believable scenario that convince their targets to give up sensitive information or perform actions that usually they don’t for strangers.
Phishing
a social engineering technique in which an attacker uses electronic communications such as email, texting, or phone calls to collect the target’s personal information or install malware on their system often by convincing the target to click a malicious link.
Spear Phishing
To achieve a higher rate of success, attackers may turn to spear phishing which is targeted attacks against specific companies, organizations, or people. In spear phishing the attacker should plan everything strategically and should observe the target so the message appears to come from someone the target would trust such as human resources staff, a manager, the corporate IT support team, a peer or a friend.
Tailgaiting/Piggybacking
is following someone through an access control point such as secure door, instead of using the credentials, badge, or key normally needed to enter.
Cunning and flattery