Social Engineering Techniques Flashcards

1
Q

Phishing

A

social engineering technique where attacker tricks user into responding to something (ex. email) to instance a malware-based attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

phishing via text message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

phishing via phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

unwanted and unsolicited digital mail sent out in bulk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spim

A

spam over instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

targeted phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster Diving

A

act of going through the garbage at an organization in order to find sensitive information that could possibly compromise a network and its resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder Surfing

A

act of looking over a persons shoulder to gather sensitive information from an individuals device/desk (can include looking through windows w/ binoculars)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A

following closely behind someone to gain unauthorized access to a physical building or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting Information

A

the act of casual conversation to extract information from a victim w/out giving the impression that they are being interrogated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

targeting a higher up w/ a phishing attack (ex. CEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Fraud

A

the act of stealing someones identity and pretending to be them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice Scams

A

scams over the phone that attempt to gain sensitive/personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential Harvesting

A

act of stealing or obtaining a persons login information (credentials) to attack a system

17
Q

Reconnaissance

A

act of gathering information about an intended victim/target to prepare for an attack

18
Q

Hoax

A

faking an event or alert in order to obtain information from a target victim

19
Q

Impersonation

A

pretending to be someone else in order to obtain sensitive/personal information from someone

20
Q

Watering Hole Attack

A

infecting a website w/ malware that users usually trust and use (specifically, one an organization may use)

21
Q

Typosquatting (URL Hijacking)

A

act of using purposely misspelled domains (ones that are commonly misspelled) for malicious purposes (ex. gooogle.com or favebook.com)

22
Q

Pretexting

A

?

23
Q

Influence campaigns and the two types

A

large scale campaigns that attempt to shift public opinion (hybrid warfare and social media)

24
Q

Hybrid warfare

A

influence campaign that…

25
Q

Social media

A

influence campaign that…

26
Q

Principles and the seven types

A

reasons for attack effectiveness. Authority, intimidation, consensus, scarcity, familiarity, trust, urgency.

27
Q

Authority

A

(principle) pretending to be someone in power to pressure a response or action from a victim (ex. CEO)

28
Q

Intimidation

A

(principle) threatening or blackmailing someone into giving up information

29
Q

Consensus

A

(principle) when an attackers claims that an action is normal or generally accepted

30
Q

Scarcity

A

(principle) focuses on the fact that people are more likely to find value in things that are less available

31
Q

Familiarity

A

(principle) creating a sense of familiarity w/ a user to take advantage of them

32
Q

Trust

A

(principle) creating a bond to gain the users trust in order to take advantage of them

33
Q

Urgency

A

(principle) claiming that something is urgent and that the intended target needs to “act fast” to pressure them to perform an action