Social Engineering Flashcards

1
Q

What is phishing?

A

Attempt to extract credentials by pretending to be from a legitimate organization or individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you tell if it’s a phishing email?

A
  • No identifying information (except spear phishing)
  • From address does not match details of received from (misleading or different domain)
  • Awkward phrasing & spelling errors
  • Links to click on and presence of shortened links
  • Creates sense of urgency
  • Asks for private information
  • Compelled to validate or confirm by entering authentication information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spear phishing?

A

When the attack is specifically targeted at you.

  • Email is personalized
  • Know you from your online profile
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming?

A

A cyber attack that redirects a website’s traffic to another fake site.

Can be done by changing hosts file or poisoning DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 types of social engineering attacks?

A
  • Authority
  • Charm
  • Pretext
  • Bait
  • Reciprocation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an authority attack?

A
  • Impersonate a person of authority and request for information or actions through legal, organizational or social authority.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a charm/empathy attack?

A
  • Make people like you or sympathise with you so that they will help you.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a pretext attack?

A
  • Attacker focus on creating a good pretext or fabricated scenario to try and steal information from.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a bait attack?

A
  • Use a false promise to pique a victim’s greed or curiosity
  • Use physical media with malware (USB, CDs) by leaving them in area.
  • Enticing ads that encourages uses to download malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a reciprocation attack?

A
  • Manipulate someone to feel grateful or obligated to you and get them into compliance by promising potential benefits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly