Social Engineering and Physical Security Terminology Flashcards

1
Q

A physical security deterrent used to protect a computer

A

Cable lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to blow cold air from the floor

A

cold aisles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Looking through trash for clues to find passwords and other pertinent information

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An eletrically conductive wire mesh that surrounds a room and prevents electromagnetic signals from entering or leaving the room.

A

Fareday cage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Typically, an email message warning of something that isn’t true. Used to cause panic and more harm than the virus.

A

Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pretending to be another person to gain information

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A device, such as a small room, that limits access to one or few individuals. Typically use eletronic locks and other methods to controll access.

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Screens that restrict viewing of monitors to only those sitting in front of them.

A

Privacy Filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Watching someone when they enter their username, password, or sensitive data

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A form of phishing in which the message is made to look as it came from someone you know and trust.

A

Spear pishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Following someone through an entry point

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attack that combines phishing using Voice over IP (VOIP)

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing large accounts such as directors, administrators or someone important that has access to sensitive data

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If it is possible to convince the person you are attempting to trick that you are in a position of authority, they may be less likely to question your request. That position of authority could be upper management, tech support,
HR, or law enforcement.

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering that can be done with threats,

with shouting, or even with guilt.

A

Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Putting the person being tricked at ease by putting the focus on them—listening intently to what they are saying, validating their thoughts, charming them—is the key to this element. The name comes from a desire that we all have to be told that we are right, attractive, intelligent, and so forth, and we tend to be fond of those who confirm this for us. By being so incredibly nice, the social engineer convinces the other party that there is no way their intentions could possibly be harmful.

A

Consensus

17
Q

Convincing the person who is being tricked that there is a limited supply of something can often be effective if carefully done. For example,
convincing them that there are only 100 vacation requests that will be honored
for the entire year and that they need to go to a fictitious website now and fill out
their information (including username and password, of course) if they want to
take a vacation anytime during the current year can dupe some susceptible
employees.

A

Scarcity

18
Q

Mental guards are often lowered, many times subconsciously, when
we are dealing with other individuals that we like. The “like” part can be gained
by someone having, or pretending to have, the same interests as we do, be
engaged in the same activities, or otherwise working to gain positive attention.

A

Familiarity

19
Q

Social engeeniering attack when someone does something for you, there is often a feeling that you owe that
person something. For example, to gain your trust, someone may help you out of
a troublesome situation or buy you lunch.

A

Trust

20
Q

to convince the individual whom they are attempting to trick that time
is of the essence. If they don’t do something right away, money will be lost, a
nonexistent intruder will get away, the company will suffer irreparable harm, or
a plethora of other negative possibilities may occur.

A

Urgency

21
Q

network security measure used to
ensure that a secure computer network is physically isolated from unsecured
networks. Those “unsecured networks” include both the Internet and any
unsecured local area networks.

A

Airgap

22
Q

Prevents interference from EMI and RFI sources

A

shielding