Security Plus - Chapter 4 Flashcards
Social Engineering
The practice of manipulating people through a variety of strategies to accomplish desired actions. Influencing users to take actions they may not have taken without coercion.
Authority Principle
A social engineering principle that relies on the fact an individual will obey someone who appears to be in charge or knowledgeable and coerces a person to perform a requested action.
Intimidation Principle
A social engineering principle that relies on scaring or bullying an individual into taking a desired action.
Consensus-Based Principle
A social engineering principle that coerce people to want to do what others are doing and persuade them to take an action. Also known as social proof. Others are doing it, so you should too.
Scarcity Principle
A social engineering principle that make something look more desirable because others are not provided this option or there is limited available.
Familiarity-Based Principle
A social engineering principle that relies on you liking the individual or even the organization the individual claims to represent.
Trust Principle
A social engineering principle that relies on a connection with the individual they are targeting. They work to build a connection with the individual until they are ready to get the person to perform an action.
Urgency Principle
A social engineering principle that creates a feeling that an action must be taken quickly due to some reason.
Phishing
A social engineering technique that describes the fraudulent acquisition of information, often focused on credentials like usernames and passwords, as well as sensitive personal information like credit card numbers and related data.
Vishing
A social engineering technique via voice or voicemail messages. Phone calls to targets that get a person to disclose information like their username and password to an attacker pretending to be a support personnel.
Smishing
Social engineering technique that uses text messages to attempt to gain private information about the target.
Misinformation and Disinformation
A social engineering technique that overloads social media, email, and other online media platforms to push information to users with an agenda that the attacker is trying to pursue.
TRUST Process
To combat misinformation and disinformation, CISA recommends to use the 5 step TRUST process to determine what is correct information.
1. Tell your story
2. Ready your team
3. Understand and assess MDM
4. Strategize a response
5. Track the outcomes
CISA Recommendations for Preparedness
- Assessing the information environment.
- Identifying any vulnerabilities
- Fortifying communication channels
- Engaging in proactive communication
- Developing an incident response plan
Impersonation
A social engineering technique where the attacker is pretending to be someone else.