J.Dion Sec. 5 Social Engineering Flashcards
Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.
Social engineering
What are the 6 main types social engineers use?
Authority
Urgency
Social proof
Scarcity
Likability
Fear
The power or right to give orders, make decisions, and enforce obedience.
Authority
Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions.
Urgency
Psychological phenomenon where individuals look to the behaviors and actions of other to determine their own decisions or actions in similar situations.
Social proof
Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply.
Scarcity
It is associated with being nice, friendly, and socially accepted by others.
Likability
Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening.
Fear
What are the four main forms of impersonation used by attackers?
Impersonation
Brand impersonation
Typosquatting
Watering Hole Attacks
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data.
Impersonation
Specific form of impersonation where an attacker pretends to represent a legitimate company or brand.
Brand Impersonation
A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical error.
Typosquatting
Typosquatting is also known as 2 other names
URL hijacking
Cyber-squatting
Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use.
Watering hole attacks
What are the 6 types of phishing attacks?
Phishing
Vishing
Smishing
Whaling
Spear phishing
Business email compromise