Social Engineering and Physical Security Flashcards

1
Q

Social Engineering Phases

A
  1. Research (dumpster dive, visit websites, tour the company)
  2. Select the victim (identify frustrated employees)
  3. Develop a relationship
  4. Exploit the relationship (collect sensitive information)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do social engineering attacks work?

A

Human nature - trusting
Ignorance of social engineering efforts
Fear (of consequences for not providing the requested information)
Greed (promised gain for providing the requested information)
A sense of moral obligation
Insufficient training
Unregulated information or physical access
Complex organizational structure
Lack of security policies
Halo effect = a single human trait influences the perception of other traits, an attractive person, a smile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Human based social engineering attacks

A

Information gathering through conversation
Dumpster Diving - TRASHINT
Impersonation
Posing as a user and requesting a password reset
Authority support - posing as a support professional and requesting a user reset their password to one provided by the attacker
Shoulder surfing - up close or long distance observation
Eavesdropping
Tailgating - have a fake badge and follow in someone with a valid badge
Piggybacking - no fake badge, just follow someone in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RFID identity theft

A

Also known as RFID skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reverse social engineering

A

Advertising that you are the support and wait for a user to contact you for help. Inside to outside communication is always more trusted than outside to inside communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insider attacks

A

Disgruntled employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer Based Attacks

A

Malicious Pop Ups
Fake AV or Rogue Security
Phishing: To mitigate:
1. Beware unknown, unexpected or suspicious originators
2. Be aware of whom the email is addressed to
3. Verify phone numbers
4. Beware bad spelling or grammar
5. Always check links
6. Use tools like Netcraft Toolbar and Phishtank Toolbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spear Phishing

A

Targeted phishing attack against an individual. If targeted against high-level targets within an organization, it is called whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

The use of malicious code of some sort that redirects a user’s web traffic, also known as phishing without a lure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spimming

A

Spam messages over instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sign in seal

A

An email protection method that uses a secret-message or image that can be referenced on any official communication within the site. This sign-in seal is kept locally on your computer so no one can copy or spoof it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing Countermeasures

A
Set up multiple layers of defense
Change management procedures
Strong authentication measures
Promoting policies and procedures
User education - is the most effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile Based Attacks

A

ZitMo (Zeus in the middle) - android malware that asked a banking user to install two factor authentication that was in actuality the malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile based social engineering attacks

A
  1. Publishing malicious apps
  2. Repackaging legitimate apps
  3. Fake security applications
  4. SMS - fake security notifications that prompt the victim to call a support number, also known as smishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical security measures

A

All the things that you can touch like fences and gates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technical security measures

A

Access control systems

17
Q

Operational mesures

A

Policies and procedures like background checks on employees, risk assessments on devices, polices regarding key management and storage

18
Q

Biometrics

A

False Rejection Rate (FRR) - percentage of time a biometric device will deny access to a legitimate user
False Acceptance Rate (FAR) - percentage of time that an unauthorized user is granted access by a biometric device
Crossover Error Rate (CER) - The intersection mark of the FRR and the FAR