Sec+ Chapter 04: Social Engineering, Physical, and Password Attacks Flashcards

1
Q

Social engineering

A

The practice of manipulating people to accomplish a desired action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

7 social engineering principles

A

1) Authority

2) Intimidation

3) Consensus

4) Scarcity

5) Familiarity

6) Trust

7) Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Fraudulent acquisition credentials, sensitive PII, etc

Usually done over email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smishing

A

Phishing via SMS text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Phishing over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spearphishing

A

Targets specific individuals or groups to gather desired information or access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

Aimed at senior employees like CEOs and CFOs (the big fish)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing defense

A

Security awareness

Reputation tools

Spam filters on email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Credential harvesting

A

The process of gathering credentials like user / pass combos

Often done via phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Attack that redirects traffic from legit sites to bad ones

Requires altered DNS entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Typosquatting

A

Misspelled and slightly off, but similar, to legit website URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering hole attacks

A

Attacks on websites users frequent to infect them there, and they take it back home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam

A

Unsolicited or junk email

Employs SE techniques to get you to open a message or click a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPIM

A

Spam over IM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dumpster diving

A

Retrieving potentially sensitive information from a dumpster or trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dumpster diving defense

A

Use secure disposal services for documents, secure dumpsters, ensure trash doesn’t have sensitive info in it

17
Q

Shoulder surfing

A

Looking over a person’s shoulder, through mirrors, etc, etc to capture info

18
Q

Shoulder surfing defense

A

Security awareness

Security screens

Polarized screen covers

19
Q

Tailgating

A

Following someone who has authorized access into an area as they open secure doors.

20
Q

Tailgating defnese

A

Make anyone present show credentials if they follow you in

21
Q

Elicitation

A

Technique to gather info without targets realizing they’re providing it

22
Q

Elicitation defense

A

Be aware, don’t be an idiot

23
Q

Prepending

A

Adding expression or phrase to emails to make it look like it passed spam filter

24
Q

Pretexting

A

Using a made up scenario to justify why you’re approaching an individual

25
Q

Identity fraud / theft

A

The illicit use of someone else’s identity

26
Q

Hoaxes

A

Intentional falsehoods

27
Q

Invoice scam

A

Sending fake invoices to organizations in the hopes of receiving payment

28
Q

Brute force attack

A

An attack that iterates through passwords until you find one that works

29
Q

Password spraying

A

Brute force attack that attempts to use a single password or small set of passwords against many accounts

30
Q

Dictionary attacks

A

Brute force attack that uses a word list for its attempts

31
Q

Hashing

A

One-way cryptographic function that takes an input and generates a unique, repeatable output

32
Q

Malicious flash drive attacks

A

Drop flash drives in a place where they’ll be picked up and plugged in by victim

Drives will have malicious code / programs on them

33
Q

Malicious USB cables

A

Cables that can capture keystrokes, capture data, or deploy malware

34
Q

Card cloning

A

Focuses on capturing information from cards like RFID and magnetic stripes often used for entry access

35
Q

Skimming

A

Attacks that use hidden or fake readers to skim cards

36
Q

Supply chain attacks

A

Attacks that compromise devices, systems, or software before it ever reaches and organization