What is Social Engineering?
Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces
Social engineering relies on psychological manipulation to trick individuals into divulging confidential information.
Name the six main types of motivational triggers used by social engineers.
These triggers exploit human psychology to manipulate individuals into compliance.
What is Impersonation in the context of social engineering?
Attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data
Impersonation can include brand impersonation, typo-squatting, and watering hole attacks.
List the types of phishing attacks.
These attacks aim to deceive individuals into revealing personal information.
What is Vishing?
Attacker tricks their victims into sharing personal or financial information over the phone
Vishing is a form of voice phishing.
What does Smishing involve?
Involves the use of text messages to trick individuals into providing their personal information
Smishing is a type of phishing attack conducted via SMS.
True or false: Phishing attacks only occur through email.
FALSE
Phishing can occur through various channels, including phone calls (vishing) and text messages (smishing).
What is Business Email Compromise (BEC)?
Sophisticated type of phishing attack targeting businesses using internal email accounts to conduct unauthorized actions
BEC can lead to unauthorized fund transfers or theft of sensitive information.
What is Typosquatting?
Form of cyber attack where an attacker registers a domain name similar to a popular website with typographical errors
Organizations can combat typosquatting by registering common misspellings of their domain names.
What are shoulder surfing and how can it be prevented?
Involves looking over someone’s shoulder to gather personal information; prevent by being aware of surroundings
High-powered cameras can also be used for shoulder surfing.
What is the difference between identity fraud and identity theft?
Both involve deception but differ in the extent of identity assumption.
What is Diversion Theft?
Involves manipulating a situation or creating a distraction to steal valuable items or information
Diversion theft can occur in various settings, including retail and corporate environments.
What is the purpose of influence campaigns?
Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group
Influence campaigns can spread misinformation and disinformation.
What is baiting?
Involves leaving a malware-infected physical device in a place where it will be found by a victim
The goal is for the victim to unknowingly install malware on their organization’s computer system.
What are the consequences of Impersonation attacks?
Organizations must provide security awareness training to mitigate these attacks.
What is pretexting?
Creating a fabricated scenario to manipulate targets into providing information
Mitigation involves training employees not to fill in the gaps for callers.
What are some common indicators of phishing attacks?
Recognizing these indicators can help individuals avoid falling victim to phishing.