Social Engineering Flashcards

1
Q

What is Authority?

A

Authority implies the right to exercise power in an organization. Attackers take advantage of this by presenting themselves as a person of authority, such as a technician or an executive, in a target organization to steal important data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Scarcity?

A

Scarcity implies the state of being scarce. In the context of social engineering, scarcity often implies creating a feeling of urgency in a decision-making process. Due to this urgency, attackers can control the information provided to victims and manipulate the decision-making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Intimidation?

A

Intimidation refers to an attempt to intimidate a victim into taking several actions by using bullying tactics. It is usually performed by impersonating some other person and manipulating users into disclosing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Consensus?

A

Consensus or social proof refers to the fact that people are usually willing to like things or do things that other people like or do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Negligent Insider?

A

Negligent insiders are insiders who are uneducated on potential security threats or who simply bypass general security procedures to meet workplace efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Professional Insider?

A

A professional insider is an insider who uses their technical knowledge to identify weaknesses and vulnerabilities in the company’s network and sell confidential information to competitors or black-market bidders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Malicious Insider?

A

A malicious insider is a disgruntled or terminated employee who steals data or destroys the company’s networks intentionally by introducing malware into the corporate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Compromised Insider?

A

A compromised insider is an insider with access to critical assets of an organization who is compromised by an outside threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is reverse social engineering?

A

Generally, reverse social engineering is difficult to carry out. This is primarily because its execution needs a lot of preparation and skills. In reverse social engineering, a perpetrator assumes the role of a knowledgeable professional so that the organization’s employees ask them for information. The attacker usually manipulates questions to draw out the required information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is piggybacking?

A

Piggybacking usually implies entry into a building or security area with the consent of the authorized person. For example, an attacker might request an authorized person to unlock a security door, saying that they have forgotten their ID badge. In the interest of common courtesy, the authorized person will allow the attacker to pass through the door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is tailgating?

A

Tailgating implies accessing a building or secured area without the consent of the authorized person. It is the act of following an authorized person through a secure entrance, as a polite user would open and hold the door for those following them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is diversion theft?

A

Diversion theft is a technique where attackers target delivery professionals or transport companies. This technique is also known as “Round the Corner Game” or “Cornet Game.” The main objective of this technique is to trick a person responsible for making a genuine delivery into delivering the consignment to the wrong location, thus interrupting the transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a honey trap?

A

The honey trap is a technique where an attacker targets a person online by pretending to be an attractive or kind person and then begins a fake online relationship to obtain confidential information about the target company. In this technique, the victim is an insider who possesses critical information about the target organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is baiting?

A

Baiting is a technique in which attackers offer end users something alluring in exchange for important information such as login details and other sensitive data. This technique relies on the curiosity and greed of the end-users. Attackers perform this technique by leaving a physical device such as a USB flash drive containing malicious files in locations where people can easily find them, such as parking lots, elevators, and bathrooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a quid pro quo?

A

In the quid pro quo technique, attackers keep calling random numbers within a company, claiming to be calling from technical support. This is a baiting technique where attackers offer their service to end-users in exchange of confidential data or login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is elicitation?

A

Elicitation is the technique of extracting specific information from the victim by involving them in normal and disarming conversations. In this technique, attackers must possess good social skills to take advantage of professional or social opportunities to communicate with persons who have access to sensitive information. In social engineering, the purpose of elicitation is to extract relevant information to gain access to the target assets