Week 3: Psychology and Social Engineering Flashcards

1
Q

What is a phishing attack?

A

victims are lured by an email to log on to a website that’s designed to steal their passwords or get them to install malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vishing attack

A

an urgent and official sounding voice mail convinces victims to act quickly or suffer severe consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a physical tailgating attack?

A

rely on trust to give the criminal physical access to a secure building or area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the Solomon Asch experiment?

A

when fake participants uniformly gave a particular response in a group setting, the lone true participant would feel pressure to conform to the group consensus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How was the Line experiment conducted?

A

An experiment of stating which line was the same length and giving fake participants to overwhelm the participant to see if he was conform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the implications of this experiment in secure systems architecture?

A

Social pressure from a majority group could affect a person to conform, allow access to technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Social Psychology Principle - reciprocity?

A

The extent to which we give back upon receiving a ‘gift’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Social Psychology Principle - liking?

A

The extent to which we believe people we like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Social Psychology Principle - Commitment and Consistency?

A

The extent to which early commitment can lead to later commitment for consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Social Psychology Principle - Scarcity?

A

The extent to which we are spurred to action if believed that the goods are in limited supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the most used passwords?

A

123456
password
qwerty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do people use bad passwords?

A

Easy to remember
Do not know consequences of access
Believe it wont happen to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three-points on the security triangle?

A

security
functionality
availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Regarding Fraud Psychology what does the frauder appeal to?

A

The mark’s kindness
The mark’s dishonesty
Distract them so they act automatically
Arouse them so they act viscerally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly