Social Engineering Flashcards

(31 cards)

1
Q

Social Engineering

A
  • Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the best defense against social engineering?

A
  • Provide security training to the users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The backbone of social engineering lies in the ability of an attacker to trick a user into __________

A
  • Doing something for them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the six main types of motivational triggers social engineers use?

A
  1. Authority
  2. Urgency
  3. Social Proof - using influence to lead others to scam
  4. Scarcity
  5. Likability
  6. Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the reason social engineers use a sense of urgency in their tactics?

A
  • To to get employees to ignore or bypass their normal security procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four main forms of impersonation used by social engineers?

A
  1. Impersonation
  2. Brand Impersonation
  3. Typosquatting
  4. Watering Hole Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When it comes to impersonation, attackers must first __________ about the organization so they can more easily earn the trust of their targeting users

A
  • Collect information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brand Impersonation

A
  • Specific form of impersonation where an attacker pretends to represent a legitimate company or brand
  • Usually executed via social media, email, or website that appears to be legit… (i.e. logo, language)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Typosquatting

A
  • A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical errors
  • Similar URL name hoping to catch those messing up (i.e. gnail.com)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Watering Hole Attacks

A
  • Targeted form of cyber attack where attackers compromise a specific website or service their target is known to use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pretexting

A
  • Creating a fabricated scenario (the “pretext”) to manipulate a victim into divulging sensitive information or performing actions they normally wouldn’t
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phishing

A
  • Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spear Phishing

A
  • Used by cyber criminals who are more tightly focused on a specific group of individuals or organizations
  • Customize attack on certain companies/users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whaling

A
  • Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business Email Compromise (BEC)

A
  • Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker
  • Taking over internal business email account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vishing (Voice Phishing)

A
  • Phone-based attack in which the attacker deceives victims into divulging personal or financial information
17
Q

Smishing (SMS Phishing)

A
  • Attack that uses text messages to deceive individuals into sharing their personal information
18
Q

Anti-Phishing Campaign

A
  • Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training
19
Q

What are some of the common characteristics of phishing emails?

A
  • Generic greetings
  • Spelling and grammar mistakes
  • Spoofed email addresses
  • Urgency
  • Unusual requests
  • Mismatched URLs
20
Q

Fraud

A
  • The wrongful or criminal deception intended to result in financial or personal gain
21
Q

Identity fraud or Identity theft

A
  • The use by one person of another person’s personal information, without authorization, to commit a crime of to deceive or defraud that other person on a third person
22
Q

What is the difference between identity fraud and identity theft?

A
  • Fraud: Attacker takes victim’s credit card number and makes charges
  • Theft: Attacker tries to fully assume identity of victim
23
Q

Invoice Scam

A
  • A scam in which a person is tricked into paying for a fake invoice for a service or product they did not order
24
Q

Influence Campaigns

A
  • Also called information operations or influence operations
  • Coordinated efforts to manipulate public opinion, decision-making, or behavior through the spread of misleading, false, or divisive information—typically leveraging digital platforms and cyber capabilities.
  • Usually committed by high-level adversaries like hacktivists, or nation-state actors
25
What's the difference between misinformation and disinformation?
MISS: Inaccurate information shared unintentionally DISS: Intentional spread of false information to deceive or mislead
26
Diversion Theft
- Manipulating a situation or creating a distraction to steal valuable items or information - Diverting internet traffic to fake websites
27
DNS Spoofing Attack
- Attacker manipulates DNS Server settings so when a user types in a legitimate website URL, they are redirected to a fake website created by attacker - Usually relies on brand impersonation to prompt user to input PII
28
Hoaxes are often paired with __________ and __________
- Phishing and Impersonation attacks
29
Shoulder Surfing
- Looking over someone's shoulder to gather personal information
30
Dumpster Diving
- Searching through trash to find valuable information
31