Social Engineering Flashcards

(17 cards)

1
Q

What is Social Engineering?

A

Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces

Social engineering relies on psychological manipulation to trick individuals into divulging confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the six main types of motivational triggers used by social engineers.

A
  • Authority
  • Urgency
  • Social Proof
  • Scarcity
  • Likability
  • Fear

These triggers exploit human psychology to manipulate individuals into compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Impersonation in the context of social engineering?

A

Attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data

Impersonation can include brand impersonation, typo-squatting, and watering hole attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the types of phishing attacks.

A
  • Phishing
  • Vishing
  • Smishing
  • Spear Phishing
  • Whaling
  • Business Email Compromise

These attacks aim to deceive individuals into revealing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Vishing?

A

Attacker tricks their victims into sharing personal or financial information over the phone

Vishing is a form of voice phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Smishing involve?

A

Involves the use of text messages to trick individuals into providing their personal information

Smishing is a type of phishing attack conducted via SMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false: Phishing attacks only occur through email.

A

FALSE

Phishing can occur through various channels, including phone calls (vishing) and text messages (smishing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Business Email Compromise (BEC)?

A

Sophisticated type of phishing attack targeting businesses using internal email accounts to conduct unauthorized actions

BEC can lead to unauthorized fund transfers or theft of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Typosquatting?

A

Form of cyber attack where an attacker registers a domain name similar to a popular website with typographical errors

Organizations can combat typosquatting by registering common misspellings of their domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are shoulder surfing and how can it be prevented?

A

Involves looking over someone’s shoulder to gather personal information; prevent by being aware of surroundings

High-powered cameras can also be used for shoulder surfing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between identity fraud and identity theft?

A
  • Identity Fraud: Use of another person’s personal information without authorization to commit a crime
  • Identity Theft: Attempt to fully assume the identity of the victim

Both involve deception but differ in the extent of identity assumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Diversion Theft?

A

Involves manipulating a situation or creating a distraction to steal valuable items or information

Diversion theft can occur in various settings, including retail and corporate environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of influence campaigns?

A

Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group

Influence campaigns can spread misinformation and disinformation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is baiting?

A

Involves leaving a malware-infected physical device in a place where it will be found by a victim

The goal is for the victim to unknowingly install malware on their organization’s computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the consequences of Impersonation attacks?

A
  • Unauthorized access
  • Disruption of services
  • Complete system takeover

Organizations must provide security awareness training to mitigate these attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is pretexting?

A

Creating a fabricated scenario to manipulate targets into providing information

Mitigation involves training employees not to fill in the gaps for callers.

17
Q

What are some common indicators of phishing attacks?

A
  • Urgency
  • Unusual Requests
  • Mismatched URLs
  • Strange Email Addresses
  • Poor Spelling or Grammar

Recognizing these indicators can help individuals avoid falling victim to phishing.