1.1: Compare and contrast different types of social engineering techniques.  Flashcards

1
Q

An attack exploiting human nature and behavior.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering, employed to obtain sensitive/private information. Can be any communication means.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing occurring over std. text msg service/app

A

Smishing (SMS phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing done via voice communication system. Includes traditional phone lines, VoIP, and mobile devices.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any type of email unsolicited and/or undesired

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unwanted communications over a messaging system via internet.

A

Spam over instant messaging (SPIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

More targeted form of phishing where message is crafted and directed to a specific group of individuals

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digging through trash/discarded materials for information on a target

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When someone is able to watch another user’s display/keyboard

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious redirection of a valid URL or IP to a fake website hosting a false version of the original destination.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When an unauthorized person enters a facility under authorization of a valid member w/o their knowledge

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Activity of gathering info from systems or people

A

Eliciting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Form of spear phishing, targeting high-value individuals (CEO, etc.)

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where malicious characters or code are added at the beginning of a legitimate file, string, or command.

A

Prepending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Act of stealing ones identity. Can refer to initial act of info gathering or when stolen info is used to take one’s account.

A

Identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering attack that attempts to steal funds from an org. using a false invoice.

A

Invoice scams

17
Q

Activity of gathering and stealing account credentials.

A

Credential harvesting

18
Q

Gathering information about a target, generally prior to an engagement/attack

A

Reconnaissance

19
Q

A fake warning about a virus or other piece of malicious code.

20
Q

Act of taking on the identity of someone to use their access/authority. Masquerading, spoofing, and identity fraud

A

Impersonation

21
Q

Attacker observation of victim habits to discover a common resource that one or more members of the target use, then infecting that resource

A

Watering hole attack

22
Q

Using mistypes of intended resources as malicious sources.

URLs and IP address typos leading to a malicious site is an example.

A

Typosquatting

23
Q

False statement crafted to sound believable attempting at convincing to act or respond

A

Pretexting

24
Q

Collection of info about an individual or org to disclose data publicly.

25
Social engineering attacks attempting to guide, adjust, or change public opinion
Influence campaigns
26
Convincing the target the actor has authority over them
Authority
27
Uses authority, confidence, or threat of harm to motivate a victim to follow orders
Intimidation
28
Taking advantage of people's tendency to mimic what others are doing, convincing the victim a particular action/response is consistent w/social norms or previous occurrences
Consensus
29
Convincing the target an object has a higher value based on limited availability.
Scarcity
30
Appearing to have common contact/relationship w/the target, or assuming the identity of that familiar contact
Familiarity
31
Building a relationship w/ the victim to convince them to reveal information/perform an action
Trust
32
The need to act quickly on the basis of a limitation of time
Urgency