ch4 Flashcards

(20 cards)

1
Q

Social engineering

A

is the process of an unauthorized individual
convincing an authorized individual to provide them with confidential
information or access to something that they shouldn’t have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering is very successful for two general reasons:

A

1- The basic desire of most people to be helpful.
2- Individuals normally seek to avoid confrontation and trouble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Principles (Reasons for Social Engineering Effectiveness)

A
  • Authority: The use of authority in social situations can lead to an environment
    where one party feels at risk in challenging another over an issue.
  • Intimidation: can be either subtle, through perceived power, or more direct,
    through the use of communications that build an expectation of superiority.
  • Consensus: Consensus is a group-wide decision.
  • Scarcity: If something is in short supply and is valued, then arriving with what
    is needed can bring rewards—and acceptance.
  • Familiarity: People do things for people they like or feel connected to.
  • Trust: is defined as having an understanding of how something will act under
    specific conditions.
  • Urgency: Time can be manipulated to drive a sense of urgency and prompt
    shortcuts that can lead to opportunities for interjection into processes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the best defense is simple:

A
  • Have processes in place that require employees to ask to see a
    person’s ID before engaging with them if the employees do not
    personally know them.
  • Periodic training and awareness do work, as proven by trends such as
    the diminished effectiveness of pop-up windows.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering Attacks

A
  • Impersonation
  • Phishing
  • Smishing
  • Vishing
  • Spam
  • Spam over Internet
    Messaging (SPIM)
  • Spear Phishing
  • Whaling
  • Pharming
  • Dumpster Diving
  • Shoulder Surfing
  • Tailgating/
    Piggybacking
  • Eliciting Information
  • Prepending
  • Identity Fraud
  • Invoice Scam
  • Credential Harvesting
  • Reverse Social
    Engineering
  • Reconnaissance
  • Hoax
  • Watering Hole Attack
  • Typo Squatting
  • Influence Campaigns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A
  • It can occur in person, over a phone, or online.
  • Impersonation can take a variety of forms—third parties, help desk
    operators, vendors, and even online sources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing

A

attacker attempts to obtain
sensitive information from users by masquerading as a trusted entity in an e-mail or instant message sent to a large group of often random users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smishing

A

version of a phishing attack using Short Message Service (SMS) on victims’ cell phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vishing

A

variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dumpster Diving

A

The process of going through a target’s trash in hopes of finding valuable information that might be used in a penetration attempt is known as dumpster diving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shoulder Surfing

A

attacker directly observing the individual entering sensitive information on a form, keypad, or keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To avoid shoulder surfing:

A
  • Use a privacy screen or filter to surround a keypad
  • More sophisticated systems can actually scramble the location of the numbers.
  • Be aware of surroundings.
  • Do not allow individuals to get into a position from which they can observe what the user is entering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tailgating/Piggybacking

A

simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a
room or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Piggybacking can be easily countered by:

A
  • training employees to use simple procedures to ensure nobody follows them too
    closely.
  • A more sophisticated countermeasure to piggybacking is a mantrap, which utilizes
    two doors to gain access to the facility. The second door does not open until the first
    one is closed, and the doors are closely spaced so that an enclosure is formed that
    only allows one individual through at a time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Eliciting Information

A

Calls to or from help desk and tech support units can be used to elicit
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reverse Social Engineering

A

Attacker hopes to convince the target to initiate the contact.

17
Q

Hoax

A

can be very damaging if it causes users to take some sort of action that weakens security

18
Q

Poor Security Practices

A

Poor security practices include:
* Poor password selection
* Using the same PIN for all different accounts&raquo_space; shoulder surfing.
* People are often in a hurry and will frequently not follow good physical security
practices and procedures.&raquo_space; Piggybacking.
* Throwing useful information in unsecured trash receptacles&raquo_space; Dumpster Diving.
* Installing unauthorized hardware and software.
* Allowing physical access by non-employees.
* Leaving sensitive information unsecured in the work area when the worker is not
present to act as custodian.

19
Q

People as a Security Tool

A

. Organizations should create the policies and procedures that establish
the roles and responsibilities for all users.
2. Users should always be on the watch for attempts by individuals to gain
information about the organization and should report suspicious activity
to their employer.
3. Organizations should provide an active security awareness program
(Initial employee training on social engineering at the time a person is
hired is important, as well as periodic refresher training).
4. Organizations should provide security training on social engineering and
desired employee security habits.

20
Q

Security Awareness

A
  • Probably the single most effective method to counter potential social engineering attacks, after establishment of the
    organization’s security goals and policies, is an active security awareness program.
  • The extent of the training will vary depending on the organization’s environment and the level of threat, but initial
    employee training on social engineering at the time a person is hired is important, as well as periodic refresher training.
  • An important element that should be stressed in training about social engineering is the type of information that the
    organization considers sensitive and may be the target of a social engineering attack.
  • There are undoubtedly signs that the organization could point to as indicative of an attacker attempting to gain access to
    sensitive corporate information.
  • All employees should be aware of these indicators. The scope of information that an attacker may ask for is very large, and many
    questions attackers pose might also be legitimate in another context (asking for someone’s phone number, for example).
    Employees should be taught to be cautious about revealing personal information and should especially be alert for questions
    regarding account information, personally identifiable information, and passwords.
  • As a final note on user responsibilities, corporate security officers must cultivate an environment of trust in their office,
    as well as an understanding of the importance of security.
  • If users feel that security personnel are only there to make their life difficult or to dredge up information that will result
    in an employee’s termination, the atmosphere will quickly turn adversarial and be transformed into an “us-versus-them”
    situation.
  • Security personnel need the help of all users and should strive to cultivate a team environment in which users, when
    faced with a questionable situation, will not hesitate to call the security office. In situations like this, security offices
    should remember the old adage of “don’t shoot the messenger.”