Social engineering
A manipulation technique that exploits h____ e____ to gain private i_________, a_____, or v________
human error; information, access; valuables;
Stages of social engineering
1) P_____
2) Establish t____
3) Use p________ tactics
4) D________ from the target
Prepare;
trust;
persuasion;
Disconnect;
Preventing social engineering
- Implementing m_________ controls
- Staying informed of t______
- Sharing your k_________ with others
managerial;
trends;
knowledge;
Common types of social engineering
- B_____
- P______
- Q___ p__ q__
- T_________
- W________ h___
Baiting;
Phishing;
Quid pro quo;
Tailgating;
Watering hole;
Baiting
security;
USB; infected USB;
Phishing
The use of d_____ c__________ to trick people into revealing s_______ data or deploying m________ s_______.
digital communications;
sensitive; malicious software;
Quid pro quo
rewarded; access, information; money;
Tailgating
unauthorized; authorized; restricted;
piggybacking;
Watering hole
threat actor; website; group; users;
malicious software;
Encouraging caution of social engineering may be done by:
- Staying a____
- Being c______
- Controlling c________
alert;
cautious;
curiosity;
Phishing kit tools
- M_________ attachments
- F___ data-collection forms
- F_________ web links
Malicious;
Fake;
Fraudulent;
Smishing
The use of t___ m_______ to obtain s_______ i_________ or to impersonate a known s______
text messages; sensitive information; source;
Vishing
The exploitation of e_______ v_____ c__________ to obtain s______ i________ or i__________ a known source
electronic voice communication; sensitive information; impersonate;
Phishing security measures
- A___-p______ policies
- E_______ t______ resources
- E____ filters
- I______ p_______ systems
Anti-phishing;
Employee training;
Email;
Intrusion prevention;
Angler phishing
attackers; customer service; social media;
Types of Malware
1) V____
2) W___
3) T_____
4) R_________
5) S______
Virus;
Worm;
Trojan;
Ransomware;
Spyware;
Virus
Malicious c___ written to i______ with c________ o_________ and cause damage to d___ and s_______
code; interfere; computer operations; data; software;
Worm
duplicate; spread; systems;
Trojan
file; program;
file; application;
Adware
legitimate; digital advertisements; applications;
Malicious; potentially unwanted application;
Potentially Unwanted Application (PUA)
software; legitimate; ads; slowdown; install;
freeware; insecure;
Spyware
Malware that is used to g_____ and s___ information without c______.
Also considered a _ _ _
gather; sell; consent;
PUA;
Spyware is commonly hidden in b_________, additional software that is sometimes packaged with other a__________
bundleware; applications;
Scareware
frighten; infecting;
fake warnings; legitimate;