Sec+ Chapter 04: Social Engineering, Physical, and Password Attacks Flashcards
Social engineering
The practice of manipulating people to accomplish a desired action
7 social engineering principles
1) Authority
2) Intimidation
3) Consensus
4) Scarcity
5) Familiarity
6) Trust
7) Urgency
Phishing
Fraudulent acquisition credentials, sensitive PII, etc
Usually done over email
Smishing
Phishing via SMS text messages
Vishing
Phishing over the phone
Spearphishing
Targets specific individuals or groups to gather desired information or access
Whaling
Aimed at senior employees like CEOs and CFOs (the big fish)
Phishing defense
Security awareness
Reputation tools
Spam filters on email
Credential harvesting
The process of gathering credentials like user / pass combos
Often done via phishing attacks
Pharming
Attack that redirects traffic from legit sites to bad ones
Requires altered DNS entries
Typosquatting
Misspelled and slightly off, but similar, to legit website URL
Watering hole attacks
Attacks on websites users frequent to infect them there, and they take it back home
Spam
Unsolicited or junk email
Employs SE techniques to get you to open a message or click a link
SPIM
Spam over IM
Dumpster diving
Retrieving potentially sensitive information from a dumpster or trash