Recognizing and Addressing Social Engineering Attacks Flashcards
What is Social Engineering?
Social engineering is the act of tricking people into giving away confidential or sensitive information, often by pretending to be someone trustworthy. Social engineering works by exploiting human vulnerabilities and can be used to steal personal information, gain unauthorized access to computer systems, or carry out other malicious activities.
What are some examples of Social Engineering goals?
- Data theft
- Data destruction
- Financial gain
- Financial harm
- Political gain
- Reputation/recognition
- Revenge
What is Data theft?
Data theft is the unauthorized or illegal taking of electronic data.
What is Data destruction?
Data destruction is the process of securely and permanently erasing electronic data to prevent unauthorized access.
Can also be used to punish/cripple a victim, often targeting infrastructure records.
What is Financial gain?
Financial gain refers to the increase in money or other assets that an individual or organization obtains through legitimate or illegitimate means. It can include profits from business activities, investments, or the proceeds from criminal activities such as fraud or theft.
What is Financial harm?
Financial harm refers to the negative impact on an individual or organization’s financial situation, often resulting from loss or damage to assets. This can include monetary losses, decreased profitability, reputational damage, legal costs, or other financial burdens.
What is Political Gain?
Political gain refers to the use of manipulative tactics to influence individuals or groups in order to achieve political objectives. This can include spreading false information or propaganda, exploiting existing biases or prejudices, or using emotional appeals to sway public opinion. Social engineering for political gain can have serious implications for democracy, as it can be used to undermine trust in institutions, distort the truth, and manipulate public discourse.
Use of Social Engineering for Reputation/Recognition
To gain the recognition of their peers
Use of Social Engineering for Revenge
Social engineering for revenge refers to the use of manipulative tactics to harm or damage an individual or organization as a form of retaliation or vengeance.
Define Attack Vectors
Attack vectors are the methods or pathways that cybercriminals or hackers use to gain unauthorized access to a system or network.
List some Attack Vectors
User name and password
Organizational and personnel information
End-user personal information
Email
Mobile device
Physical access
Define High-Value Targets and give examples
Someone whose knowledge, access, or possessions can enhance the impact of a successful attack.
Examples:
* C-suite officials
* Accounting personnel
* HR personnel
* IT personnel
C-Suite Officials
C-Suite officials are the highest-ranking executives within an organization, including CEOs, COOs, CFOs, CIOs, and CSOs. They are responsible for managing the company and making critical decisions that impact its success. Due to their important positions, they are often targeted by attackers seeking to gain access to sensitive data or compromise the organization’s systems.
Accounting Personnel
Accounting personnel are responsible for managing an organization’s financial transactions and reporting. They handle sensitive financial information and are often targeted by attackers seeking to gain access to financial data or steal money through fraudulent activities.
HR (Human Resources) Personnel
HR personnel manage an organization’s human resources and may be involved in recruiting, benefits administration, and ensuring labour law compliance. They handle sensitive employee information and may be targeted by attackers seeking to steal personal data or engage in identity theft.
IT (Information Technology) Personnel
IT personnel manage an organization’s technology infrastructure and systems, including tasks such as network administration, software development, technical support, and information security. Due to their involvement in critical systems and data, they may be targeted by attackers seeking to exploit vulnerabilities or gain unauthorized access to sensitive information.