Social Engineering Flashcards
What is the first type of motivational trigger used by social engineers?
Authority
Most people comply with requests from those they perceive as authority figures.
What does the urgency trigger in social engineering refer to?
A compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly
This trigger causes people to prioritize certain actions due to perceived time constraints.
Define social proof in the context of social engineering.
A psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions
This often occurs in situations where individuals are uncertain about how to act.
What psychological pressure is associated with the scarcity trigger?
The feeling that a product, opportunity, or resource is limited or in short supply
This trigger can lead individuals to act quickly to secure what they perceive as scarce.
How does likability function as a motivational trigger in social engineering?
Most people want to interact with people they like
Social engineers may leverage sexual attraction, pretend to be a friend, or highlight common interests.
What is the focus of fear as a motivational trigger in social engineering attacks?
Threatening individuals with negative consequences if they do not comply
This approach often includes warnings of bad things happening if instructions are not followed.
What is impersonation in the context of cyber attacks?
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data
Attackers collect information about the organization to earn the trust of their targeted users.
What is required for an impersonation attack to be effective?
The attacker must collect information about the organization to earn the trust of targeted users
Attackers provide details to make their lies and impersonation more believable.
Define brand impersonation.
A specific form of impersonation where an attacker pretends to represent a legitimate company or brand
Attackers use the brand’s logos, language, and information to create deceptive communications or websites.
What is typosquatting?
A form of cyber attack where an attacker registers a domain name similar to a popular website but with common typographical errors
Also known as URL hijacking or cybersquatting.
Explain what a watering hole attack is.
A targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use
The term is a metaphor for a naturally occurring phenomenon, where the ‘watering hole’ is usually a trusted website or online service.
True or False: Typosquatting is also referred to as brand impersonation.
False
Typosquatting is also known as URL hijacking or cybersquatting.
Fill in the blank: _______ is a form of impersonation where an attacker pretends to represent a legitimate company.
[brand impersonation]
List the four main forms of impersonation used by attackers.
- Impersonation
- Brand Impersonation
- Typosquatting
- Watering Hole Attacks
What is pretexting?
Gives some amount of information that seems true so that the victim will give more information
Pretexting is often used in social engineering attacks to manipulate individuals into divulging confidential information.
What is phishing?
Sending fraudulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers
Phishing is one of the most common cyber attack methods.
What is spear phishing?
More targeted form of phishing that is used by cybercriminals who are more tightly focused on a specific group of individuals or organizations
Spear phishing typically has a higher success rate compared to general phishing.
What is whaling in the context of phishing attacks?
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
Whaling is aimed at obtaining sensitive information from key decision-makers.
What is the primary goal of whaling attacks?
To compromise an executive’s account for subsequent attacks within their organization
The rewards for successful whaling can be significantly higher due to the access gained.
What is Business Email Compromise (BEC)?
Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform malicious actions
BEC attacks often exploit trust within the organization.
What is vishing?
Attacker tricks their victims into sharing personal or financial information over the phone
Vishing is a form of social engineering that exploits human psychology.
What is smishing?
Involves the use of text messages to trick individuals into providing their personal information
Smishing combines SMS technology with phishing tactics.
What is an Anti-phishing Campaign?
An essential user security awareness training tool to educate individuals about phishing risks and identifying potential phishing attempts
This campaign is designed to improve user awareness and reduce the likelihood of falling victim to actual phishing attacks.
What should an Anti-phishing Campaign offer to users who fell victim to simulated phishing emails?
Remedial training
This training aims to reinforce learning and help users recognize and avoid real phishing attempts in the future.
What is a common indicator of phishing attacks that involves time sensitivity?
Urgency
Phishing attacks often create a sense of urgency to trick victims into acting quickly.
What type of request is commonly associated with phishing attacks?
Unusual Requests
Phishing attempts frequently involve requests that are not typical for the recipient.
What is a key indicator of phishing that involves discrepancies in web addresses?
Mismatched URLs
Phishing emails may contain URLs that do not match the legitimate website addresses.
What type of email addresses are often found in phishing attempts?
Strange Email Addresses
Phishing emails may originate from addresses that appear suspicious or unfamiliar.
What is a common language issue found in phishing emails?
Poor Spelling or Grammar
Many phishing attempts are characterized by noticeable spelling and grammatical errors.
What is the primary focus of mitigation in cybersecurity?
To reduce the impact of potential threats and attacks
Mitigation strategies involve various actions to minimize risks.
What is a key action to take when encountering suspicious messages?
Report suspicious messages to protect your organization from potential phishing attacks
Reporting helps in early detection and prevention of phishing attacks.
What should organizations do after analyzing a phishing threat?
Inform all users about the threat
User awareness is crucial for preventing further incidents.
What action should be taken if a phishing email was opened?
Conduct a quick investigation and triage the user’s system
This helps in identifying and mitigating any potential damage.
What should an organization do after a successful phishing attack?
Revise its security measures
Continuous improvement in security protocols is essential for preventing future attacks.
Fill in the blank: To protect against phishing, organizations should _______ suspicious messages.
report
Reporting is a proactive measure against phishing threats.
True or False: Informing users about phishing threats is unnecessary if an attack has occurred.
False
User education is vital in preventing future incidents.
What is identity fraud?
In identity fraud, the attacker takes the victim’s credit card number and charges items to the card
Identity fraud specifically involves financial transactions using stolen credit card information.
What is identity theft?
In identity theft, the attacker tries to fully assume the identity of their victim
Identity theft can involve various forms of identity misrepresentation beyond financial fraud.
Define scams.
Fraudulent or deceptive act or operation
Scams can take many forms, including phishing, Ponzi schemes, and more.
What are influence campaigns?
Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group
Influence campaigns can utilize various media platforms to reach their audience.
What is the purpose of influence campaigns?
They are a powerful tool for shaping public opinion and behavior
Influence campaigns can be used for political, social, or commercial purposes.
What do influence campaigns foster?
Misinformation and disinformation
These campaigns can lead to confusion and misinformed public discourse.
Define misinformation.
False or inaccurate information shared without harmful intent
Misinformation can spread unintentionally, often through social media.
Define disinformation.
Involves the deliberate creation and sharing of false information with the intent to deceive or mislead
Disinformation is often used in propaganda and strategic communication.
What is diversion theft?
Involves manipulating a situation or creating a distraction to steal valuable items or information
This technique often relies on misdirection to facilitate theft.
Define hoaxes in the context of cybersecurity.
Malicious deception that is often spread through social media, email, or other communication channels
Hoaxes can lead to misinformation and potential security breaches.
What is shoulder surfing?
Involves looking over someone’s shoulder to gather personal information
This technique is commonly used in public spaces to obtain sensitive data.
Describe dumpster diving.
Involves searching through trash to find valuable information
This practice can uncover sensitive documents, personal data, and other confidential materials.
What does eavesdropping entail?
Involves the process of secretly listening to private conversations
Eavesdropping can occur through various means, including electronic devices.
What is baiting in cybersecurity?
Involves leaving a malware-infected physical device, like a USB drive, in a place where it will be found by a victim
The victim may unknowingly install malware on their organization’s computer system by using the device.