Section 5.37 Social Engineering Motivation Triggers Flashcards

Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices

1
Q

Social Engineering

A

Manipulative strategy exploiting human psychology for unauthorised access to systems, data, or physical spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6 main motivations

Motivational Triggers that social engineers use

A.U.S.S.L.F

A
  1. Authority
  2. Urgency
  3. Social Proof
  4. Scarcity
  5. Likeability
  6. Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Motivations explained

Authority

A

Most people are willing to comply and do what you tell them to do if they believe it is coming from somebody who is in a position of authority to make that request

e.g attacker states he is an authoriative figure in the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Motivations explained

Urgency

A

Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritise certain actions

e.g Attacker giving a USB thumb drive to staff stating he has an urgent meeting in 5 mins and needs to print something

Attackers use the sense of urgency to get the organisations employeess to ignore or bypass their normal procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motivations explained

Social Proof

A

Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations

e.g if I can get likes and shares from my scam website people will begin to believe its legit - knock on effect

Reviews on courses is a great example no reviews vs 1000 positive views

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motivations explained

Scarcity

A

Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply

e.g Sign up now as places are limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Motivations explained

Likability

A

Most people want to interact with people they like, and social engineers realise this

e.g Attractive woman talking to guys at work who would open up about what they are working on

Sexual attraction, Pretending to be a friend, Common intrest.

These scammers tend to seem like very nice people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Motivations explained

Fear

A

These types of attacks generally are focused on “if you don’t do what I tell you, then this bad thing is going to happen to you”

e.g Your files may have been encrypted and you are being blackmailed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly