Section 27.259 Avoiding Social Engineering Flashcards
Objective 5.6 Given a scenario, you must be able to implement security awareness practices
Social Engineering
Involves deception to manipulate individuals into breaching security procedures
■ Attacks exploit human psychology and often appear innocent
■ Awareness and vigilance serve as the first line of defense against social engineering attacks
Maintaining Situational Awareness
Situational Awareness
Mindfulness about surroundings and actions
■ Essential to avoid social engineering attacks
Maintaining Situational Awareness
Examples of social engineering threats
● Shoulder surfing
● Eavesdropping
Maintaining Situational Awareness
Measures to counter threats
● Shoulder surfing
● Eavesdropping
● Privacy screen protectors
● Secure discussions
Piggybacking and Tailgating
Social engineers may try to enter secured premises by closely following authorised personnel
■ Use access control vestibules to restrict entry to one person at a time
■ Maintain situational awareness to prevent unauthorised access
Dumpster Diving
Attackers sift through garbage for discarded information
■ Employees with situational awareness can spot such activities
■ Dispose of sensitive data securely to avoid being a victim of this attack
Operational Security (OPSEC)
Protects critical information from being used by adversaries
■ Safeguard sensitive data, daily routines, and internal procedures
■ Discourage sharing seemingly innocuous details on social media or during
personal interactions
Technological Social Engineering Attacks
Baiting attacks use removable media devices (e.g., USB thumb drives) and charging cables
■ Picking up or connecting found devices can infect workstations or networks with malware
■ Carry your own charging cables and chargers to avoid untrusted ones
Pressure Tactics
Social engineers may use a sense of urgency or fear to manipulate individuals
■ Urgent requests aim to bypass normal security protocols
■ People are more likely to make mistakes when rushed into action
Proactive Culture of Security
■ Train employees regardless of their position in the company
■ Educate on recognizing phishing attempts, data privacy, and safe online behavior
■ Encourage employees to report suspicious activities
■ Conduct practical exercises, like simulated phishing attacks, to test and remediate
employees’ responses