Social Engineering Flashcards

1
Q

Social Engineering

A

strategy that exploits human psychology to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering Factors (A U S S L F)

A

Authority, Urgency, Social Proof, Scarcity, Likability, and Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Impersonation

A

the adversary assumes the identity of another person to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brand Impersonation

A

where an attacker pretends to represent a legitimate company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Typo squatting

A

when an attacker registers a domain name similar to a popular website but not exact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Watering Hole Attack

A

an attack where you target the dependency website of the target to attack from there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pretext

A

giving information that may be true to bait revealing more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

Fraudulent attack using deceptive emails from trusted sources to trick users and harvest their information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spear Phishing

A

a targeted version of phishing focused on a specific group of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between phishing and spear phishing

A

phishing is a spray and pray, spear phishing targets users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whaling Spear Phishing

A

targets high profile targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Email Compromise (BEC)

A

a phishing attack that uses internal email accounts within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vishing

A

the phone based phishing attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smishing

A

the ms-based phishing attempt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti-Phishing Campaign

A

tool for educating employees about phishing risk and prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fraud

A

the wrongful or criminally deceitful intention to result in financial or personal gain

17
Q

Identity Fraud

A

the use of one person of another person’s personal information

18
Q

Identity Fraud vs Theft

A

In Fraud, the attacker takes the person’s credit card number and makes charges; In theft, the attacker is trying to assume the identity of the victim

19
Q

Scam

A

a fraudulent or deceptive act/operation

20
Q

Invoice Scam

A

a person is tricked into paying for a fake invoice that they didn’t order

21
Q

Influence Campaign

A

used to create misinformation and disinformation

22
Q

Misinformation

A

inaccurate information shared unintentionally

23
Q

Disinformation

A

intentional spread of false information

24
Q

Diversion Theft

A

manipulating a situation or creating a distraction to steal information

25
Hoax
evil deception spread through social media
26
Shoulder Surfing
looking over someone’s shoulder to steal information