Section 29 - Social Engineering Flashcards

1
Q

What is “Social Engineering”?

A

Any act that manipulates users into revealing confidential information or performing other actions that are detrimental to that user or the security of our systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is “pretexting”?

A

When an attacker gives some amount information that seems true so that you’ll give us more information to fill in the gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an “insider threat”?

A

Somebody who works for your organization but they ulterior motives and they want to do something negative to your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is “phishing”?

A

A victim is contacted by email, telephone, text message, or some other method posing as a legitimate organization.

*** When you see phishing on the exam, always equate it to mean “email” because telephone and text messages are called something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “vishing”?

A

Phishing to telephones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “smishing”?

A

Phishing to text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The best practice to prevent phishing is…?

A

Don’t click on any links in emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is “spear phishing”?

A

Phishing that’s focused on a specific person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is “whaling”?

A

Phishing that’s focused specifically on a high-level executive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is pharming?

A

Tricking someone to go to a different website

*** often used in conjunction with vishing or smishing to get you directed to that fraudulent link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What motivates the users to fall for social engineering?

A
  1. Authority - people make these mistakes when they believe someone of authority is demanding it of them
  2. Financial institutions - when people believe they own money, have lost money or could gain money
  3. Urgency - people naturally want to help others so when someone asks you for a favor people tend to comply especially if the situation at hand is urgent
  4. Social proof - people are likely to click on things that are popular. Those that have lots of likes, shares and when they see their friends doing it.
  5. Scarcity - when there’s a good deal but supplies are limited. This tricks many people into falling for a scam
  6. Likeability - When the person scamming you is so incredibly likeable that you fall for their proposed scam (ex. a very attractive woman)
  7. Fear - being threatened to not act will result in some kind of penalty to you (like being arrested)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “diversion theft”?

A

This occurs when a thief tries to divert a shipment and take responsibility for it and sends it to a different location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a “hoax”?

A

This is an attempt at deceiving people into believing something is false even if it’s true or making them believe something is true even if it’s false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is “shoulder surfing”?

A

Literally what it sounds like. Someone obtains information from you by looking at your screen from behind where you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is “eavesdropping”?

A

Overhearing information that an attacker wants to get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is “dumpster diving”?

A

Scavenging for personal or confidential information in garbage or recycling containers

17
Q

What is “baiting”?

A

When a malicious individual leaves behind a malware-infected device someplace where someone curious enough will pick it up and connect it to one of their devices

18
Q

What is “piggybacking”?

A

When an unauthorized person tags along with an authorized person to gain access into a restricted area

19
Q

What is a “watering hole” attack?

A

When an attacker figures out where your users like to go, like a common website, they then attack that website, embed malware so the next time when they go to that website they download that malware.

20
Q

What is “fraud”?

A

The wrongful or criminal deception intended to result in financial or personal gain

*** This isn’t like stealing because you’re being tricked into doing it yourself

21
Q

What is “identity fraud”?

A

The use by one person of another person’s personal information without their authorization to commit a crime or to deceive or defraud that other person or some other third party

*** like stealing your credit card info and making charges as if they are you

22
Q

What is the difference between identity fraud and identity theft?

A

When somebody commits identity theft, they’re actually stealing another person’s identity and using it at their own. They become you.

23
Q

What is a “scam”?

A

A scam is a fraudulent or deceptive act or operation

*** Essentially, someone trying to deceive you into doing something

24
Q

What is an “invoice scam”?

A

This is a scam in which a person is tricked into paying for a fake invoice for a product or service that they did not actually order

25
Q

What is “prepending”?

A

This is a very technical method that’s used in social engineering to trick users into entering their usernames and passwords and other sensitive information by adding what’s considered essentially an invisible string before the web link when they go to click on something in an email.

26
Q

What is an “influence operation”?

A

This is a collection of tactical information about an adversary, as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent

*** When you take information and use it against someone. This is a military term but CompTIA use the term “influence campaign.” An influence campaign is one small part of a larger influence operation but the two terms are used interchangeably.

27
Q

What is “hybrid warfare”?

A

This is a military strategy that employs the full spectrum of warfare. It uses political warfare, conventional warfare, regular warfare and cyber warfare.

28
Q
A