Social Engineering Flashcards

1
Q

Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Creating a fabricated scenario to manipulate targets.
Impersonating trusted figures to gain trust

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used by Social Engineers
● Familiarity and Likability
● Consensus and Social Proof
● Authority and Intimidation
● Scarcity and Urgency

A

Motivational Triggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of Motivational Trigger where Most people are willing to comply and do what you tell them to do if they believe it is coming from somebody who is in a position of authority to make that request

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of Motivational Trigger where a Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of Motivational Trigger, a Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations

A

Social Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of Motivational Trigger, a Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Most people want to interact with people they like, and social engineers realize this.

A

Likeability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of Motivational Trigger, where These types of attacks generally are focused on “if you don’t do what I tell you, then this bad thing is going to happen to you”

A

Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

More specific form of impersonation where an attacker pretends to
represent a legitimate company or brand

A

Brand Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Also known as URL hijacking or cybersquatting. A Form of cyber attack where an attacker will register a domain name that
is similar to a popular website but contain some kind of common
typographical errors

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Targeted form of cyber attack where attackers compromise a specific
website or service that their target is known to use

A

Watering Hole Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gives some amount of information that seems true so that the victim will give more information

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sending fraudulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

More targeted form of phishing that is used by cybercriminals who are more tightly focused on a specific group of individuals or organizations. Has a higher success rate

A

Spear Phishing

17
Q

Form of spear phishing that targets high-profile individuals, like CEOs or CFO

A

Whaling

18
Q

Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker

Taking over a legitimate business email accounts through social
engineering or cyber intrusion techniques to conduct unauthorized fund transfers, redirect payments, or steal sensitive information

A

Business Email Compromise (BEC)

19
Q

Attacker tricks their victims into sharing personal or financial information over the phone

A

Vishing (Voice Phishing)

20
Q

Involves the use of text messages to trick individuals into providing their personal information

A

Smishing (SMS Phishing)

21
Q

Essential user security awareness training tool that can be used to educate individuals about the risks of phishing and how to best identify potential phishing attempts

A

Anti-Phishing Campaign

22
Q

Urgency, Unusual Requests, Mismatched URLs, Strange EMail Address, Poor Spelling or grammer or examples of…

A

Key Indicators of Phishing Attacks

23
Q

Wrongful or criminal deception that is intended to result in financial or personal gain for the attacker

A

Fraud

24
Q

Involves the use of another person’s personal information without their authorization to commit a crime or to deceive or defraud
that other person or some other third party

A

Identity Fraud and Identity Theft

25
Q

Fraudulent or deceptive act or operation

A

Scam

26
Q

Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group.

Are a powerful tool for shaping public opinion and behavior

Foster misinformation and disinformation

A

Influence Campaign

27
Q

False or inaccurate information shared without harmful intent

A

Misinformation

28
Q

Involves the deliberate creation and sharing of false information with the intent to deceive or mislead

A

Disinformation

29
Q

Involves manipulating a situation or creating a distraction to steal
valuable items or information

A

Diversion Theft

30
Q

Malicious deception that is often spread through social media, email, or other communication channels

Often paired with phishing attacks and impersonation attacks

A

Hoaxes