Social Engineering Flashcards

1
Q

Pretexting

A

Pretexting is a method of inventing a scenario to convince victims to divulge information they should not divulge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insider Threat

A

A person who works with your organisation but has ulterior motives. -E.g.: Employees who steal information are insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

An attempt to fraudulently obtain information from a user (usually by email).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spear Phishing

A

An attempt to fraudulently obtain information from a user (usually by email). Spear Phishing targets a specific individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whaling

A

A form of spear phishing that directly targets the CEO, CFO, CIO, CSO or other high-value target in an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

Phising conducted over SMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vishing

A

Phising that occurs over voice calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pharming

A

Phising attempt to trick a user to access a different website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 6 Motivation Factors in Social Engineering

A
  • Authority
  • Urgency
  • Social Proof
  • Scarcity
  • Likeability
  • Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Diversion Theft

A

When a thief trys to divert a shipment to another location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hoax

A

Deceiving people into believing something is false when it’s true (or vice versa)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Shoulder Surfacing

A

Someone watches your activities in person to obtain authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eavesdropping

A

When a person uses direct observation to “listen” in to a conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dumpster Diving

A

When a person scavenges for information in garbage containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Baiting

A

When a malicious individual leaves malware-infected removable media such as a USB drive or optical disk in plain view for a victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Piggybacking

A

When an unauthorised person tags along with an authorized person to gain entry to a restricted area.

17
Q

Watering Hole Attack

A

When an attacker figures out where users like to go, and places malware to gain access to your organisation.

18
Q

Fraud

A

A wrongful or criminal deception indented to result in financial or personal gain.

Most common within cybersecurity is Identity Theft.
There is a difference between Identity theft and Identity fraud.

19
Q

Scam

A

A fraudulent or deceptive act or operation.

20
Q

Invoice Scam

A

Where an individual or organisation is tricked into paying a fake invoice for a service or product they didn’t order

21
Q

Prepending

A

Adding an invisible string before a weblink that a victim would click.

22
Q

Influence Campaign (Influence Operations)

A

The collection of tactical information about an adversary as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent.

(Take information and use it again someone). CompTIA uses the term Influence Campaign)

23
Q

Hybrid Warfare

A

A military strategy which employs political warfare, conventional warfare, irregular warfare and cyberware.

Companies like facebook and twitter have been victims of attempts by foreign threat actors to influence the political and social landscape.

24
Q

What can you train users to do to prevent a security incident?

A
  • Never give out their authentication information
  • Screen emails & calls carefully, train them to make logs of “unusual events”
  • Train users how to use encryption
  • Train users never to pick up and make use of removal media
  • Shred sensitive information
  • Comply with data handling and disposal policy
  • Teach them good web security
  • Implement a clean desk policy
25
Q

Clean Desk Policy

A

A policy where all employees must put away everything (files & folders) from their desk at the end of the day into locked drawers and cabinets