Chapter 10: Social Engineering and Other Foes Flashcards
Shoulder Surfing
Watching someone over their shoulder when they enter their private info
Privacy Filters
Go on a screen to make it so that you must be looking straight at the screen to see its display
Meme
Any concept that spreads quickly through the Internet
Whaling
Phishing a specific important user
Ideally, your systems should have a minimum of _______ physical barriers.
Three
Physical Tokens
Anything that a user must have on them to access network resources
Cable Lock
Attaches to a computer to make it unable to leave the desk
CCTV
Security camera technologies
PTZ
Pan, Tilt, Zoom
Protected Distribution System (PDS)
A system in which the network is secure enough to allow for the transmission of classified info in unencrypted format
Security Zone
An area where access is individually monitored and controlled
PASS Method
Pull, Aim, Squeeze, Sweep (for fire extinguishers)
Faraday Cage
An electronically conductive wire mesh that is grounded that provides electronic shielding
Desensitizing
When RF levels become too high and cause receivers in wireless units to become deaf
What does phreaking involve?
Phone shit!
TEMPEST
Standards for not letting out EMI or RFI
Hot Aisle
Hot air outlets are used to cool the equipment
Cold Aisle
Cold air intake is used to cool equipment
Minimum Humidity Level
50 percent
Prevents electrostatic damage
Deterrent Control
Anything intended to warn a would-be attacker that they should not attack
Preventive Control
Something that stops something from happening, such as locks
Detective Control
Detects a violation or intrusion
Compensating Control
Backup controls when others have failed
Technical Control
Controls implemented through technology, such as firewalls, IDS, IPS, etc.