Social engineering Flashcards

1
Q

What is the principle of security?

A

Confidentiality
integrity
availablitiy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulneability?

A

a weakness: software bugs, defaults configurations, weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat?

A

a event that violates the CIA

Examples: malware, phishing, hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a attack?

A

is a exploitation of a vulnerability

Examples: Network attack, Application attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is social engineering?

A

bad actors tricking authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

this is a email based scam that get tricks the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different tpes of Phsing?

A
Vishing
smishing
spear phishing
whaling
spam
spim (instant messaging)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is vhishing?

A

This a scam done over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is smishing?

A

This is a sms text based scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a spear phishing?

A

This is a specific company that is scammed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is whaling?

A

This is a scam against someone in managment with a higher authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spam?

A

is flood of suspcious emails or spim which a flood of supscious text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming

A

copying a certain DNS and then getting users to go to the site and steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is water hole attack?

A

This attack where a bad actor spoofs a website and steal credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is typo squatting?

A

This where a bad actor would redirect people from mispelled websites to malicious site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

some physical techniques types?

A

Dumpster diving
shoulder surfing
tailgating
pretexting - a prescipted story attack

17
Q

Other outlier attacks types

A

Invoice scam
hoax
prepending