Social Engineering Flashcards

Objectives 2.2 and 5.6

1
Q

Define / Explain

Social Engineering

Social Engineering

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces

Social Engineering

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Informational / List

Motivational Triggers
(used by social engineers)

Social Engineering

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Familiarity and Likability
  • Consensus and Social Proof
  • Authority and Intimidation
  • Scarcity and Urgency

Social Engineering

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define / Explain

Impersonation

Social Engineering - Techniques

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Pretending to be someone else
  • Includes brand impersonation, typo-squatting, and watering hole attacks

Social Engineering - Techniques

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define / Explain

Pretexting

Social Engineering - Techniques

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Creating a fabricated scenario to manipulate targets
  • Impersonating trusted figures to gain trust

Social Engineering - Techniques

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List

Types of Phishing Attacks

Social Engineering

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Phishing
  • Vishing
  • Smishing
  • Spear Phishing
  • Whaling
  • Business Email Compromise

Social Engineering

List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define / Explain

Frauds and Scams

Social Engineering

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Deceptive practices to deceive people into parting with money or valuable information

Social Engineering

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define / Explain

Influence Campaigns

Social Engineering

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Spreading misinformation and disinformation, impacting politics, economics, etc.

Social Engineering

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Informational / List

Other Social Engineering Attacks

Social Engineering

Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Diversion Theft
  • Hoaxes
  • Shoulder Surfing
  • Dumpster Diving
  • Eavesdropping
  • Baiting
  • Piggybacking
  • Tailgating

Social Engineering

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Informational / List

Six main types of motivational triggers that social engineers use…

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Authority
  • Urgency
  • Social Proof
  • Scarcity
  • Likeability
  • Fear

Motivational Triggers

Informational / List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define / Explain

Authority

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Most people are willing to comply and do what you tell them to do if they believe it is coming from somebody who is in a position of authority to make that request

Motivational Triggers

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define / Explain

Urgency

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions

Motivational Triggers

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define / Explain

Social Proof

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations

Motivational Triggers

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define / Explain

Scarcity

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply

Motivational Triggers

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define / Explain

Likeability

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Most people want to interact with people they like, and social engineers realize this.

Can be…
* Sexual attraction
* Pretending to be a friend
* Common interest

Motivational Triggers

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define / Explain

Fear

Motivational Triggers

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

These types of attacks generally are focused on “if you don’t do what I tell you, then this bad thing is going to happen to you”

Motivational Triggers

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List

Four main forms of impersonation used by attackers…

Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Impersonation
  • Brand Impersonation
  • Typosquatting
  • Watering Hole Attacks

Impersonation

List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define / Explain

Impersonation

Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Attack where an adversary assumes the identity of another person to gain unauthroized access to resources or steal sensitive data

Impersonation

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Informational

Impersonation requires…

Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

the attacker to collect information about the organization so that they can more easily earn the trust of their targeted users

Impersonation

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Informational

Impersonation attackers…

Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

provide details to help make the lies and the impersonation more believable to a potential victim

Impersonation

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List

Impersonation consequences…

Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Unauthorized access
  • Disruption of services
  • Complete system takeover

Impersonation

List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Informational

Impersonation…

Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

To mitigate against these types of attacks, organizations must provide security awareness training to their employees on a regular basis so that they remain vigilant against future attacks

Impersonation

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define / Explain

Brand Impersonation

Impersonation - Brand Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

More specific form of impersonation where an attacker pretends to represent a legitimate company or brand

Impersonation - Brand Impersonation

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Informational

Brand Impersonation…

Impersonation - Brand Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Attackers use the brand’s logos, language, and information to create deceptive communications or website

Impersonation - Brand Impersonation

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Informational

To protect against brand impersonation, organizations should do the following…

Impersonation - Brand Impersonation

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Educate their useres about these types of attacks
  • Use secure email gateways to filter out phishing emails
  • Regularly monitor their brand’s online presence to detect any fradulent activities as soon as they occur

Impersonation - Brand Impersonation

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define / Explain

Typosquatting

Impersonation - Typosquatting

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Form of cyber attack where an attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors

Impersonation - Typosquatting

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define / Explain

Typosquatting is also known as…

Impersonation - Typosquatting

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

URL hijacking or cybersquatting

Impersonation - Typosquatting

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Informational

To combat typosquatting, organizations will often do the following…

Impersonation - Typosquatting

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Register common misspellings of their own domain names
  • Use services that monitor for similar domain registrations
  • Conduct user security awareness training to educate users about the risks of typosquatting

Impersonation - Typosquatting

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define / Explain

Watering Hole Attacks

Impersonation - Watering Hole Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use

Impersonation - Watering Hole Attacks

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Informational

The term is a metaphor for a naturally occuring phenomenon…

Impersonation - Watering Hole Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

In the world of cybersecurity, the “watering hole” the attacker chooses to utilize will usually be a trusted website or online service

Impersonation - Watering Hole Attacks

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Informational

To mitigate watering hole attacks, organizations should do the following…

Impersonation - Watering Hole Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Keep their systems and software updated
  • Use threat intelligence services to stay informed about new threats
  • Employ advanced malware detection and prevention tools

Impersonation - Watering Hole Attacks

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define / Explain

Pretexting

Pretexting

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Gives some amount of information that seems true so that the victim will give more information

Pretexting

Define / Explain

32
Q

Informational

Pretexting…

Pretexting

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Mitigation involves training the employees not to fall for pretext and not to fill in the gaps for people when they are calling

Pretexting

Informational

33
Q

List

Different Types of Phishing Attacks

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Phishing
  • Spear Phishing
  • Whaling
  • Business Email Compromise (BEC)
  • Vishing (Voice Phishing)
  • Smishing (SMS Phishing)

Phishing Attacks

List

34
Q

Define / Explain

Phishing

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Sending fradulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers

Phishing Attacks

Define / Explain

35
Q

Define / Explain

Spear Phishing

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • More targeted form of phishing that is used by cybercriminals who are more tightly focused on a specific group of individuals or organizations
  • Has a higher success rate

Phishing Attacks

Define / Explain

36
Q

Define / Explain

Whaling

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Form of spear phishing that targets high-profile individuals, like CEOs or CFOs

Phishing Attacks

Define / Explain

37
Q

Informational

Whaling…

Phishing Attacks - Whaling

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Attacker isn’t trying to catch the little fish in an organization, but instead they want to catch one of the executives, board members, or higher level managers in the company since the rewards are potentially much greater
  • Often used as an initial step to compromise an executive’s account for subsequent attacks within their organization

Phishing Attacks - Whaling

Informational

38
Q

Define / Explain

Business Email Compromise
(BEC)

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker
  • Taking over a legitimate business email account through social engineering or cyber intrusion techniques to conduct unauthorized fund transfers, redirect payments, or steal sensitive information

Phishing Attacks

Define / Explain

39
Q

Define / Explain

Vishing
(Voice Phishing)

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Attacker tricks their victims into sharing personal or financial information over the phone

Phishing Attacks

Define / Explain

40
Q

Define / Explain

Smishing
(SMS Phishing)

Phishing Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves the use of text messages to trick individuals into providing their personal information

Phishing Attacks

Define / Explain

41
Q

Informational

Preventing Phishing Attacks

Preventing Phishing Attacks

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

By implementing the right strategies and providing user security awareness training, the threat of a successful phishing campaign against your organization can be mitigated effectively

Preventing Phishing Attacks

Informational

42
Q

Define / Explain

Anti-phishing Campaign

Preventing Phishing Attacks

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Essential user security awareness training tool that can be used to educate individuals about the risks of phishing and how to best identify potential phishing attempts
  • Should offer remedial training for users who fell victim to simulated phishing emails

Preventing Phishing Attacks

Define / Explain

43
Q

Informational / List

To help prevent phishing your organization should regularly conduct user security awareness training that contains coverage of the various phishing techniques…

Preventing Phishing Attacks

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Phishing
  • Spear Phishing
  • Whaling
  • Business Email Compromise
  • Vishing
  • Smishing
  • Along with other relevant cyber threats and attacks that may affect your organization

Preventing Phishing Attacks

Informational / List

44
Q

List

There are some commonly used key indicators that are associated with phishing attacks…

Preventing Phishing Attacks

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Urgency
  • Unusual Requests
  • Mismatched URLs
  • Strange Email Addresses
  • Poor Spelling or Grammar

Preventing Phishing Attacks

List

45
Q

Define / Explain

Urgency

Preventing Phishing Attacks - Key Indicators

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

Phishing emails often create a sense of urgency by prompting the recipient to act immediately

Preventing Phishing Attacks - Key Indicators

Define / Explain

46
Q

Define / Explain

Unusual Requests

Preventing Phishing Attacks - Key Indicators

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

If you receive an email requesting sensitive information, such as passwords or credit card numbers, you should treat these emails with a lot of suspicion

Preventing Phishing Attacks - Key Indicators

Define / Explain

47
Q

Define / Explain

Mismatched URLs

Preventing Phishing Attacks - Key Indicators

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • When you are looking at an HTML-based email, the words you are reading are called the display text, but the underlying URL of the weblink could be set to anything you want
  • To check if the text-based link matches the underlying URL, you should always hover your mouse over the link in the email for a few seconds and this will reveal the actual URL that the link is connected to

Preventing Phishing Attacks - Key Indicators

Define / Explain

48
Q

Define / Explain

Strange Email Addresses

Preventing Phishing Attacks - Key Indicators

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

If the real email address and the displayed email address don’t match, then the email should be treated as suspicious and possibly part of a phishing campaign

Preventing Phishing Attacks - Key Indicators

Define / Explain

49
Q

Define / Explain

Poor Spelling or Grammar

Preventing Phishing Attacks - Key Indicators

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A

If an email has a lot of “broken English”, poor grammar, or numerous spelling errors, it is likely to be part of a phishing campaign

Preventing Phishing Attacks - Key Indicators

Define / Explain

50
Q

Informational

Mitigation…

Preventing Phishing Attacks

Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices

A
  • Training
  • Report suspicious messages to protect your organization from potential phishing attacks
  • Analyze the threat
  • Inform all users about the threat
  • If the phishing email was opened, conduct a quick investigation and triage the user’s system
  • An organization should revise its security measures for every successful phishing attack

Preventing Phishing Attacks

Informational

51
Q

Define / Explain

Fraud

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Wrongful or criminal deception that is intended to result in financial or personal gain for the attacker

Frauds and Scams

Define / Explain

52
Q

Informational

One of the most common types of fraud that you will see online is known as…

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Identity fraud or identity theft

Frauds and Scams

Informational

53
Q

Define / Explain

Identity Fraud / Theft

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves the use of another person’s personal information without their authorization to commit a crime or to deceive or defraud that other person or some other third party

Frauds and Scams

Define / Explain

54
Q

Define / Explain

The difference between identity fraud and identity theft…

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • In identity fraud, the attacker takes the victim’s credit card number and charges items to the card
  • In identity theft, the attacker tries to fully assume the identity of their victim

Frauds and Scams

Define / Explain

55
Q

Define / Explain

Scams

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Fradulent or deceptive act or operation

Frauds and Scams

Define / Explain

56
Q

Define / Explain

Most common scam is called the…

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

invoice scam

Frauds and Scams

Define / Explain

57
Q

Define / Explain

Invoice Scam

Frauds and Scams

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

A person is tricked into paying for a fake invoice for a product or service that they did not actually order

Frauds and Scams

Define / Explain

58
Q

Define / Explain

Influence Campaigns

Influence Campaigns

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group

Influence Campaigns

Define / Explain

59
Q

Informational

Influence Campaigns…

Influence Campaigns

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Are a powerful tool for shaping public opinion and behavior
  • Foster misinformation and disinformation

Influence Campaigns

Informational

60
Q

Define / Explain

Misinformation

Influence Campaigns

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

False or inaccurate information shared without harmful intent

Influence Campaigns

Define / Explain

61
Q

Define / Explain

Disinformation

Influence Campaigns

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves the deliberate creation and sharing of false information with the intent to deceive or mislead

Influence Campaigns

Define / Explain

62
Q

Informational

Remember, misinformation and disinformation…

Influence Campaigns

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

can have serious consequences because they undermine public trust in institutions, fuel social divisions, and even influence the outcomes of elections

Influence Campaigns

Informational

63
Q

List

Other common social engineering attacks include…

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Diversion Theft
  • Hoaxes
  • Shoulder Surfing
  • Dumpster Diving
  • Eavesdropping
  • Baiting
  • Piggybacking / Tailgating

Other Social Engineering Attacks

List

64
Q

Define / Explain

Diversion Theft

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves manipulating a situation or creating a distraction to steal valuable items or information

Other Social Engineering Attacks

Define / Explain

65
Q

Define / Explain

Hoaxes

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Malicious deception that is often spread through social media, email, or other communication channels

Other Social Engineering Attacks

Define / Explain

66
Q

Informational

Hoaxes…

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Often paired with phishing attacks and impersonation attacks
  • To prevent hoaxes people must fact check and use good critical thinking skills

Other Social Engineering Attacks

Informational

67
Q

Define / Explain

Shoulder Surfing

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves looking over someone’s shoulder to gather personal information

Other Social Engineering Attacks

Define / Explain

68
Q

Informational

Shoulder Surfing…

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Includes the use of high powered cameras or closed-circuit television cameras to steal information from a distance
  • To prevent shoulder surfing, users must be aware of their surroundings when providing any sensitive information

Other Social Engineering Attacks

Informational

69
Q

Define / Explain

Dumpster Diving

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves searching through trash to find valuable information

Other Social Engineering Attacks

Define / Explain

70
Q

Informational

Dumpster Diving…

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Commonly used to find discarded documents containing personal or corporate information
  • Use clean desk and clean desktop policies

Other Social Engineering Attacks

Informational

71
Q

Define / Explain

Eavesdropping

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves the process of secretly listening to private conversations

Other Social Engineering Attacks

Define / Explain

72
Q

Informational

Eavesdropping…

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Perpetrator intercepts the communication of parties without their knowledge
  • Prevent this by encrypting data in transit

Other Social Engineering Attacks

Informational

73
Q

Define / Explain

Baiting

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves leaving a malware-infected physical device, like a USB drive, in a place where it will be found by a victim, who will then hopefully use the device to unknowingly install malware on their organization’s computer system

Other Social Engineering Attacks

Define / Explain

74
Q

Informational

Baiting…

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

To prevent baiting, train users to not use devices they find

Other Social Engineering Attacks

Informational

75
Q

Define / Explain

Piggybacking and Tailgating

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves an unauthorized person following an authorized person into a secure area

Other Social Engineering Attacks

Define / Explain

76
Q

Define / Explain

Tailgating

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Attacker attempts to follow an employee through an access control vestibule or access control point without their knowledge

Other Social Engineering Attacks

Define / Explain

77
Q

Define / Explain

Piggybacking

Other Social Engineering Attacks

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Involves an attacker convincing an authorized employee to let them into the facility by getting the authorized employee to swipe their own access badge and allow the attacker inside the facility

Other Social Engineering Attacks

Define / Explain