Social Engineering Flashcards
Manipulates a user into revealing confidential information that are
detrimental to that user or the security of our systems
Social Engineering
A person who works for or with your organization but has ulterior
motives
Insider Threat
An attempt to fraudulently obtain information from a user (usually by
email)
Phishing
An attempt to fraudulently obtain information from a user, usually by
email that targets a specific individual
Spear Phishing
A form of spear phishing that directly targets the CEO, CFO, CIO, CSO, or
other high-value target in an organization
Whaling
Phishing conducted over text messaging (SMS)
Smishing
Phishing conducted over voice and phone calls
Vishing
Phishing attempt to trick a user to access a different
or fake website (usually by modifying hosts file)
Pharming
When a thief attempts to take responsibility for a shipment by diverting
the delivery to a nearby location
DiversionTheft
Attempt at deceiving people into believing that something is false when it
is true (or vice versa)
Hoax
When a person uses direct observation to obtain authentication
information
Shoulder Surfing
When a person uses direct observation to “listen” in to a conversation
Eavesdropping
When a person scavenges for private information in garbage containers
Dumpster Diving
When a malicious individual leaves malware-infected removable media
such as a USB drive or optical disc lying around in plain view
Baiting
When an unauthorized person tags along with an authorized person to
gain entry to a restricted area
Piggybacking
When an attacker figures out where users like to go, and places malware
to gain access to your organization
Watering Hole Attack
The wrongful or criminal deception intended to result in financial or
personal gain
Fraud
The use by one person of another person’s personal information, without
authorization, to commit a crime or to deceive or defraud that other
person or a third person
Identity Fraud
A fraudulent or deceptive act or operation
Scam
A scam in which a person is tricked into paying for a fake invoice for a
service or product that they did not order
Invoice Scan
A technical method used in social engineering to trick users into entering
their username and passwords by adding an invisible string before the
weblink they click
Prepending
The collection of tactical information about an adversary as well as the
dissemination of propaganda in pursuit of a competitive advantage over
an opponent
Influence Operations
A military strategy which employs political warfare and blends
conventional warfare, irregular warfare and cyberwarfare with other
influencing methods, such as fake news, diplomacy, and foreign electoral
intervention
Hybrid Warfare
Policy where all employees must put away everything from their desk at
the end of the day into locked drawers and cabinets
Clean Desk Policy