Social Engineering Flashcards

1
Q

What is the Definition of Social Engineering

A

Social engineering attacks use deception and manipulation to trick users into revealing sensitive information or making mistakes that compromise the security of their devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 Laws relating to this

A

The Computer Misuse Act 1990The Fraud Act 2006The General Data Protection Regulation (GDPR)The Privacy and Electronic Communications (EC Directive) Regulations 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Computer Misuse Act 1990

A

This Act makes it a criminal offence to gain unauthorised access to computer systems through hacking, viruses and other forms of cyber-attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Fraud Act 2006

A

This Act makes it a criminal offence to carry out deception withthe intention of making a gain or causing a loss. Social engineering scams, such as phishing and vishing, are often covered under the Fraud Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the The Privacy and Electronic Communications (EC Directive) Regulations 2003

A

This regulation regulates the use of electronic communication services, including e-mail, voice calls and text messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different sectors social engineering is in

A
  • commerce* personal finance and home banking* process control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of techniques in social engineering

A
  • Phishing * Vishing* Baiting* E-mail Hacking* Pretexting* Quid pro quo scams * Active digital footprints* Passive digital footprints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is phishing

A

Fraud emails, text messages or websites that appear to be trustworthy but not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is vishing

A

Uses voice calls or other things with voice to trick people into leaking personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is baiting

A

When somebody leaves a valuable USB to trick people into taking it and using it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly