Identifying Security Threats And Vulnerabilities 2 Flashcards
List types of social engineering
Spoofing. Impersonation. Hoax. Phishing. Vishing. Whaling. URL hijacking. Spam & slim. Shoulder surfing. Dumpster diving. Tailgating.
What is a social engineer attack
A type of attack that uses deception to trick users into providing sensitive data or violating security guidelines.
Spoofing
Human based or software based social engineering attack. Goal is to pretend to be someone else for identity concealment. Can occur in IP Addresses, MAC Addresses, and email.
Impersonation
Human based social engineering attack where attacker pretends to be someone they are not. Successful in situations where identity cannot easily be established
Hoax
Email based or web based social engineering attack. Intended to trick the user to perform undesired actions or give up important information or money.
Phishing
Email based social engineering attack where attacker sends an email that seems to come from a respected institution. Wants the user to provide private information to verify an account.
Spear phishing
Email based social engineering attack targeting specific individuals or institutions
Pharming
Similar to phishing social engineering attack but redirects a request for a website to a similar but fake site
Vishing
Human based social engineering attack where the goal is to extract personal private information using the phone system IP based voice messaging services such as VoIP
Whaling
social engineering attack a form of spear phishing that targets individuals of great wealth
URL hijacking
Also called typo squatting. Exploits typos that users sometimes make when entering a URL into a browser
Spam and slim
social engineering Email based threat where the users inbox is flooded with emails that carry advertising material for products. Can sometimes deliver viruses or malware.
Slim attack is Similar to spam done through instant messaging
Shoulder surfing
social engineering attack where an attacker looks over shoulder to get passwords and PIN numbers
Dumpster diving
Social engineering attack where the goal is to get private information by inspecting the trash
Tailgating
Also called piggy backing. Human based social engineering attack where the attacker follows an employee through a secure area.
What is a white hat hacker
Discovers and exposes security flaws in apps and OSs so that manufacturers can fix them Geoffrey becoming wide spread. Aka ethical hack
What is a black hat hacker
Discovers and exposes security flaws for financial gain or malicious purpose.
What is a grey hat hacker
Discovers and publicizes security problems without the permission or knowledge of an organization. Moral intent is in question.
Why does social engineering work
Common and therefore successful. Exploits basic human trust, thought processes and behavior. Takes advantage of users who aren’t thinking critically or the human need to want to belong to groups and defer actions to the wisdom of crowds. The weakest link can compromise an entire system
Categories of attackers
Malicious insider Electronic activists Data thief Script kiddie Electronic vandal Cyberterrorist
A malicious insider threat is
A threat originating from an employee in an organization who performs malicious acts. Fueled by resentment motivated by financial gain
Electronic activist or hacktivist
Motivated by a desire to cause social change or promoting a message by replacing the info on public websites. Cause damage to organizations deemed socially irresponsible or unworthy
Data thief
Blatantly steals resources or confidential information for personal or financial gain. Covers their tracks to avoid detection. Exploits unauthorized access or acts in collusion with a disgruntled employee
Script kiddie
Aka Novice attacker has limited technical knowledge and motivated to gain and display skill