Social Engineering Flashcards

1
Q

Attack against user and involves some form of social interaction

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is social engineering effective?

A

it preys on people’s basic desire to be helpful and the desire to avoid confrontations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacker sends emails masquerading as a trusted entity (such as a bank) to a bulk of recipients in an attempt to obtain sensitive information. This attack is generally not targeted at any particular group, but rather, just sent in bulk, casting a wide net and hoping to get who they can.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This term refers to a phishing attack that is targeted at a specific group. If an attacker were to obtain a list of
specific users and their email addresses, they could exploit this to target those specific users. In the instance of a bank, if I were to receive a message from a bank that I didn’t use, I’d probably know the email was a phishing email. But if the email were to
come from my bank, I might be more susceptible to respond. With spear phishing, the success rate of the attacks increases significantly.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing attack to a high value target such as CXO of a company

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing attempts using variations of voice communication technology.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Act of going through trash to find valuable information that might be used in penetration attempts.

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Indirect interaction that attackers use to observe individuals entering sensitive information.

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Regular occurrence on most social media sites - suggestion to make change

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

First identified by RSA, this type of attack involves infecting a website with malware. As users visit the site, they unknowingly pull down malware to their system. Named for the way predators wait for prey near their watering hole, attackers similarly plant malware at sites frequently visit.

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly