Social Engineering Flashcards

1
Q

Phishing

A

type of cyber attack in which malicious actors attempt to deceive individuals or organizations into divulging sensitive information, such as login credentials, personal information, or financial details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

form of cyberattack and social engineering technique that involves sending fraudulent or malicious text messages (SMS) to individuals with the aim of tricking them into revealing sensitive information, downloading malware, or taking some harmful action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

type of social engineering attack that involves using voice communication, typically phone calls, to deceive individuals or organizations into revealing sensitive information, such as personal information, financial data, or login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

refers to the mass distribution of unsolicited and often irrelevant or inappropriate messages, primarily through electronic communication channels like email, text messages, and social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spam over instant messaging (SPIM)

A

form of unsolicited and often intrusive messaging that occurs through instant messaging (IM) platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

targeted form of phishing attack that involves cybercriminals sending highly customized and deceptive emails or messages to a specific individual or a select group of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A

physical form of information gathering and social engineering that involves searching through discarded materials, such as trash bins, dumpsters, or recycling containers, to obtain valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder surfing

A

form of social engineering and information theft that involves an attacker surreptitiously observing or “surfing” over the shoulder of a person to glean sensitive or confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

cyber attack that involves redirecting the traffic of a legitimate website to a fraudulent or malicious website, usually without the victim’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A

social engineering technique where an unauthorized individual gains physical access to a secured area by closely following an authorized person as they enter a restricted space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting information

A

social engineering technique used to obtain sensitive or valuable information from individuals, often through manipulation and persuasion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

specific type of phishing attack that targets high-profile individuals within organizations, such as top executives, senior managers, or individuals with access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A

refers to a technique used by attackers to manipulate or deceive security systems, particularly those that rely on lists, databases, or filtering rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity fraud

A

type of crime in which an individual’s personal information is stolen and used for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A

type of financial scam in which fraudsters manipulate invoices or payment requests to deceive individuals or organizations into making fraudulent payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential harvesting

A

cyber attack technique where malicious actors attempt to steal usernames and passwords from individuals or organizations.

17
Q

Reconnaissance

A

refers to the initial phase of an attack where malicious actors gather information about a target, such as an individual, organization, or system.

18
Q

Hoax

A

deceptive or misleading scheme or fabrication designed to trick individuals or the public into believing something false or fictitious.

19
Q

Impersonation

A

social engineering technique where an attacker pretends to be someone else or a trusted entity to deceive individuals or organizations.

20
Q

Watering hole attack

A

sophisticated cyber attack that targets a specific group of individuals or organizations by compromising websites they frequently visit.

21
Q

Typosquatting

A

also known as URL hijacking or domain mimicry, is a cyber attack technique where malicious actors register domain names that are similar to popular, legitimate websites but contain slight typographical errors or variations.

22
Q

Pretexting

A

social engineering technique in which an attacker fabricates a scenario or pretext to manipulate individuals into revealing sensitive information or performing specific actions.

23
Q

Influence campaigns

A

especially in the context of hybrid warfare and social media, involve coordinated efforts to shape public opinion, sow discord, or achieve strategic objectives through the use of information, disinformation, and psychological manipulation.

24
Q

Principles

A

These principles explain the reasons why certain social engineering techniques are effective in persuading individuals to comply with requests or take specific actions.

25
Q

What are these principles?

A
  • Authority
  • Intimidation
  • Consensus
  • Scarcity
  • Familiarity
  • Trust
  • Urgency