Social Engineering Flashcards
Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces
Social Engineering
Creating a fabricated scenario to manipulate targets.
Impersonating trusted figures to gain trust
Pretexting
Used by Social Engineers
● Familiarity and Likability
● Consensus and Social Proof
● Authority and Intimidation
● Scarcity and Urgency
Motivational Triggers
Type of Motivational Trigger where Most people are willing to comply and do what you tell them to do if they believe it is coming from somebody who is in a position of authority to make that request
Authority
Type of Motivational Trigger where a Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions
Urgency
Type of Motivational Trigger, a Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations
Social Proof
Type of Motivational Trigger, a Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply
Scarcity
Most people want to interact with people they like, and social engineers realize this.
Likeability
Type of Motivational Trigger, where These types of attacks generally are focused on “if you don’t do what I tell you, then this bad thing is going to happen to you”
Fear
Attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data
Impersonation
More specific form of impersonation where an attacker pretends to
represent a legitimate company or brand
Brand Impersonation
Also known as URL hijacking or cybersquatting. A Form of cyber attack where an attacker will register a domain name that
is similar to a popular website but contain some kind of common
typographical errors
Typosquatting
Targeted form of cyber attack where attackers compromise a specific
website or service that their target is known to use
Watering Hole Attacks
Gives some amount of information that seems true so that the victim will give more information
Pretexting
Sending fraudulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers
Phishing