Social Engineering Flashcards
Define Social Engineering
At its core it is manipulating a person into knowingly or unknowingly giving up information; essentially ‘hacking’ into a person to steal valuable information.
- Psychological manipulation
- Trickery or deception for the purpose of information gathering
It is a way for criminals to gain access to information systems. The purpose of social engineering is usually to secretly install spyware, other malicious software or to trick persons into handing over passwords and/or other sensitive financial or personal information
the most effective routes to stealing confidential data from organizations.
List the 6 types of Social Engineering Attacks
- Phishing
- Vishing and Smishing
- Pretexting
- Baiting
- Tailgating and Piggybacking
- Quid Pro Quo
List 3 different types of phishing
- Deceptive Phishing
- Spear Phishing
- Whaling
Define Deceptive Phishing
- Legitimate Links
- Company Logos & Theme
- Copy of Landing/Login Page
- Shortened URL & Redirects
Define Spear Phishing
an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
Define Whaling
- Similar to spear phishing
- Aimed at executives of a company
- Goal is to gain access to an administrator account
List 5 ways to prevent Phishing
- Employee awareness !
- Multistep verification
- Data protection policies
- Social media education
- Anti-phishing tools and organizations
Define Vishing
the use of telephony to conduct phishing attacks.
Define Smishing (SMS phishing)
the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
Define Pretexting
cybercriminal stages a scenario that baits victims into providing valuable information they wouldn’t have otherwise
Baiting
relies on
- curiosity or greed of the victim
- promise of an item or good that hackers use to entice victims
Define Quid Pro Quo
Hacker requesting the exchange of critical data or login credentials in exchange for a service
Solution to QPQ
dont give personal account information unless you initiated the exchange
What is Google Dorking
A hacking technique that makes use of Google’s advanced search services to locate valuable data or hard-to-find content.
- A search string or custom query that uses advanced search operators to find information not readily available on a website
What can Google Dorking be used to retrieve
- usernames and passwords
- email address lists
- sensitive documents
- personally identifiable information
- personally identifiable financial information
- website vulnerabilities