Section 4: Social Engineering Flashcards

1
Q

What is Social Engineering?

A

A manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Authority refer to in social engineering?

A

Leveraging perceived authority to compel compliance from targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of Urgency in social engineering?

A

Creating a sense of immediacy to provoke quick action from individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Social Proof influence targets?

A

Influencing decisions by showcasing the actions of others to persuade targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Scarcity in the context of social engineering?

A

Pressuring targets by highlighting limited availability of resources or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Likability mean in social engineering?

A

Gaining trust from targets by appearing friendly or relatable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Fear used in social engineering?

A

Using threats or potential consequences to force compliance from individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Impersonation?

A

Pretending to be someone else to gain unauthorized access to information or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Brand Impersonation?

A

Mimicking a legitimate company to deceive targets into providing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Typosquatting?

A

Registering domain names that are similar to legitimate ones to exploit common typing errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Watering Hole Attacks?

A

Compromising frequently visited websites of targets to deliver malware or phish for information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Pretexting?

A

Creating a false scenario to manipulate individuals into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phishing?

A

Deceptive communications designed to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Spear Phishing?

A

Targeted phishing attacks aimed at specific individuals or organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Whaling?

A

Phishing attacks that target high-profile individuals, such as executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Business Email Compromise (BEC)?

A

Using compromised internal emails to deceive employees into sharing confidential information.

17
Q

What is Vishing?

A

Phishing conducted via phone calls to extract sensitive information.

18
Q

What is Smishing?

A

Phishing executed through SMS or text messages to trick individuals into providing personal information.

19
Q

What are Frauds and Scams?

A

Deceptive practices intended to trick individuals into providing money or sensitive information.

20
Q

What is Identity Fraud/Theft?

A

Using someone else’s personal information for illegal activities.

21
Q

What are Invoice Scams?

A

Tricking individuals into paying fraudulent invoices.

22
Q

What are Influence Campaigns?

A

Coordinated efforts aimed at spreading misinformation or disinformation to sway public opinion or behavior.

23
Q

What is Diversion Theft?

A

Creating distractions to steal items or information without being noticed.

24
Q

What are Hoaxes?

A

Spreading false information to deceive individuals or create panic.

25
Q

What is Shoulder Surfing?

A

Observing someone’s screen or keyboard to gain sensitive information without their knowledge.

26
Q

What is Dumpster Diving?

A

The practice of searching through trash or discarded materials to find valuable information or data.

27
Q

What is Eavesdropping?

A

The act of secretly listening to private conversations, often to gather confidential or sensitive information.

28
Q

What is Baiting?

A

A technique where infected devices, such as USB drives, are left in locations for victims to find and use, potentially compromising their systems.