Social Engineering Flashcards

1
Q

An attempt by an attacker to convince someone to provide info or perform an action they wouldn’t normally do.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most common SE attack. Trick users into giving up personal information or click malicious links. #1 Attack for malware.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attackers trying to gain access to your usernames & passwords that might be stored on your local computer.

A

Credential Harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fake warning about a virus or other malicious code. Cause no damage, but their distribution causes fear and uncertainty. Use to spread “through email from a friend” but changed with social media.

A

Hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack strategy in which the attacker guesses or observes which websites an organization uses & infects one or more of them with malware.

A

Watering Hole Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Targets internet users who incorrectly type a URL into their web browser rather than using a search engine.

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacker tries to convince a victim to give up information to access a service or system. The attacker develops a story or pretext to fool the victim.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strategic use of casual conversation to extract information without the arousing suspicious of the target.

A

Eliciting Information or Elicitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SE attack intended to manipulate the thoughts of large groups of people.

A

Influence Campaign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack using mix of conventional or unconventional methods to carry out an influence campaign.

A

Hybrid Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer controlled by an attacker which is used to send commands to systems compromised by malware and receive stolen data from a target network.

A

Command & Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adding words or phrases like ‘safe’ to a malicious file or suggesting topics via social engineering to uncover info.

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type of phishing attack that happens through SMS text messaging on mobile.

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of phishing attack that targets high level executes.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing type of attack that relies on voice, phone calls, voicemails to steal confidential & corporate info.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spam over instant messaging also considered an irritant.

A

Spim

17
Q

Type of phishing that targets specific groups of users.

A

Spear phishing

18
Q

Gathering important details from things people have thrown out in the trash.

A

Dumpster Diving

19
Q

When an unauthorized individual might follow you in through that open door without badging in themselves.

A

Tailgating

20
Q

Criminal practice where thieves steal your personal data by spying over your shoulder.

A

Shoulder surfing

21
Q

Online scam similar to phishing. A website’s traffic is manipulated and confidential info is stolen.

A

Pharming

22
Q
A