IS 414 CH. 6 Flashcards

1
Q

Explain how social engineering techniques are used to gain physical or logical access to computer resources.

A
  • has a conversation with someone to trick, lie to, or deceive
  • has information, knowledge, authority, or confidence that makes it appear that he belongs or knows what he is doing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

social engineering

A

the techniques or psychological tricks used to get people to comply with the perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network. It is usually to get the information needed to obtain confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

7 Human traits fraudsters take advantage of

A
  1. compassion - the desire to help others who present themselves as needing your help
  2. greed - get something out of it
  3. sex appeal - more willing to help if you’re good looking
  4. sloth - take advantage of our lazy habits since few people want to do things the hard way
  5. trust - more likely to cooperate if you gain their trust
  6. urgency - sense of immediate need leads people to be more cooperative
  7. vanity - appeal to their vanity, tell them they’ll be more popular
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policies & Procedures

A
  1. Never let people follow you into a restricted building
  2. Never log in for someone else on a computer, especially if you admin access
  3. Never give sensitive information over the phone or through e-mail
  4. Never share passwords or IDs
  5. Be cautious of anyone you don’t know who is trying to gain access through you
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Social Engineering

A

identity theft, pretexting, posing, phishing, vishing, carding, pharming, evil twin, typosquatting/URL hijacking, tabnapping, scavenging/dumpster diving, shoulder surfing, lebanese looping, skimming, chipping, eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

any software that is used to do harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the different types of malware used to harm computers.

A

spyware, adware, torpedo software, scareware, randsomware, keylogger, trojan horse, timebomb/logic bomb, trap door/back door, packet sniffers, steganography, rootkit, superzapping, virus, worm, bluesnarfing, bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly