Social Engineering Flashcards

1
Q

Social Engineering

A

Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motivational triggers

A
  • Familiarity and Likability
  • Consensus and social proof
  • authority and intimidation
  • scarcity and urgency
  • Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering Techniques

A
  • Impersonation (people and brands) - pretend to be someone else
  • Pretexting - create a fabricated scenario
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Typosquatting (URL Hijacking/Cybersquatting)

A

Cyber attack where an attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors

To combat:
- register common misspellings of their own domain names
- use services that monitor for similar domain registrations
- conduct user security awareness training to educate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Watering Hole Attacks

A

Targeted form of cyber attack where attackers compromise a specific website or service that their target is know to use
- the “watering hole” the attacker chooses to use will usually be a trusted website or online service

Mitigation:
- keep systems up to date
- use threat intelligence services to stay informed about new threats
- employ advanced malware detection and prevention tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pretexting

A

Gives some amount of information that seems true so that the victim will give more information

Mitigation: training the employees not to fall for pretext and not to fill in the gaps for people when they are calling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

Sending fraudulent emails that appear to be from reputable sources with
the aim of convincing individuals to reveal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spear Phishing

A

More targeted form of phishing that is used by cybercriminals who are
more tightly focused on a specific group of individuals or organizations
- Has a higher success rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whaling

A

Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
- used as an initial step to compromise an executive’s account for subsequent attacks in their organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Email Compromise (BEC)

A

targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vishing

A

Attacker tricks their victims into sharing personal or financial information over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Smishing

A

Involves the use of text messages to trick individuals into providing their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anti-phishing Campaign

A

Essential user security awareness training tool that can be used to educate individuals about the risks of phishing and how to best identify potential phishing attempts
- should offer remedial training for users who fell victim to simulated phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key indicators of phishing attacks

A
  • Urgency
  • Unusual requests
  • Mismatched URLs
  • Strange email addresses
  • Poor spelling or grammar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mitigation for phishing

A
  • Training
  • Report suspicious messages
  • analyze the threat
  • inform all users about the threat
  • Revise security measures for every successful attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fraud

A

Wrongful or criminal deception that is intended to result in financial or personal gain for the attacker

17
Q

Identity Fraud and Identity Theft

A

Involves the use of another’s personal information without their authorization to commit a crime or to deceive or defraud that other person or some other third party

Difference:
- Fraud - attacker takes victim credit card number and charges it
- Theft - attacker tries to assume the identity of their victim

18
Q

Scams

A

Fraudulent or deceptive act or operation
- most common scam = invoice scam, trick into paying for a fake invoice for a product or service that they did not order

19
Q

Influence campaigns

A

Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group
- a powerful tool for sharing public opinion and behavior
- foster misinformation (no harmful intent, undermines trust, fuels division) and disinformation (harmful intent

20
Q

Diversion Theft

A

Involves manipulating a situation or creating a distraction to steal
valuable items or information

21
Q

Hoaxes

A

Malicious deception that is often spread through social media, email, or other communication channels
- often paired with phishing attacks and impersonation attacks
- prevent by fact checking and using critical thinking skills

22
Q

Shoulder Surfing

A

involves looking over someone’s shoulder to gather personal information
- Includes the use of high powered cameras or closed-circuit television
cameras to steal information from a distance
- To prevent : users must be aware of their surroundings when providing any sensitive information

23
Q

Eaves dropping

A

Secretly listening to private conversations

24
Q

Baiting

A

Involves leaving a malware-infected physical device, like a USB drive, in a
place where it will be found by a victim, who will then hopefully use the device to unknowingly install malware on their organization’s computer system

prevent: train users to not use devices they find