Lesson 10 - Chapter 3: Social Engineering and Spam Flashcards

1
Q

What is social engineering?

A

the process of tricking or manipulating people inside an organization to gain access to its network/steal information

(network login, credit card number, company customer data, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering attacks are usually… ?

A

used as one step in a larger plot to gain access (so if you discover one, ramp up your search for other attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is infiltration?

A

someone entering the building under disguise (cleaning personnel, repair techs, messengers, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Phishing?

A

the act of trying to get people to give their security information (usernames, passwords, bank details, etc) by pretending to be someone else electronically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a phishing attack look like?

A

an example is a bad guy sends you an email from “your credit card company” asking for your username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spear Phishing?

A

a targeted phishing attack (specific person like a celebrity or politician)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is voice phishing (vishing)?

A

VoIP (Voice over IP), like voice messages expressing an urgent need for information by someone posing as a rep of a reputable company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is whaling?

A

an attacker targets an authentic, important individual in a senior position in a company and tries to mislead the whale into disclosing sensitive information

(grant access to an internal network, paying money to the fraudster, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 7 tips for spotting phishing messages?

  1. check the e
  2. check to see if it
  3. look for g
  4. be s
  5. check the u
  6. do not f
  7. ignore u
A
  1. Check the email address it’s from
  2. Check to see if it addresses you by name (not generic customer)
  3. Look for grammar/spelling mistakes and unprofessional language (threats of ending service)
  4. Be skeptical of attachments
  5. Check the URL behind a hyperlink (hover over it)
  6. Do not follow hyperlinks
  7. Ignore urgent requests to act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the most common telephone scam?

A

“I forgot my username and password”

(attacker learned someone’s account name through an infiltration method)

(Don’t tell them the password over the phone just in case, have it be sent to their recovery method)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shoulder surfing?

A

an attacker observing a user’s screen or keyboard for information over their shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is tailgating? What is it also called?

A

also called piggybacking

an unauthorized person enters a secured facility by walking directly behind one or more people being admitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is impersonation?

A

Using disguises, pretending to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is dumpster diving?

A

searching through refuse for information (and a form of intrusion)

(shred documents, use licensed shredding company for sensitive documents)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Be careful of what when it comes to clicking/opening emails?

A

be careful of spoofed email addresses or hacked friend’s email accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly