Flashcards in Chapter 10 - Social Engineering and Other Foes Deck (19):
What are the different types of Social Engineering Attacks?
- Shoulder Surfing
- Dumpster Diving
What are the Principles behind Social Engineering?
- Authority - Trust
- Intimidation - Scarcity
- Consensus/Social Proof - Urgency
- Familiarity/ Liking
At what frequency do the Proximity readers work at?
For smart cards = 13.56 MHz
For Proximity cards = 125 KHz
What is a man-trap?
A series of interconnecting interlocks in which one door must close before another is opened.
What is PDS?
Protected Distribution System
The network is secure enough to allow for the transmission of classified information in unencrypted format.
What is occasionally referred to as Wetware?
What helps in decreasing shoulder surfing?
What does CERT stand for?
Computer Emergency Readiness Team
What is Whaling?
Instead of sending out a "To Whom It May Concern" message, the whaler identifies one person from whom they can gain all the data they want, usually the manager or owner.
What is Vishing?
Combined with phishing and VoIP, is an elevated form of social engineering
What is the only preventive measure in dealing with Social Engineering?
Is to educate your users
What are a few things to deter intruders from breaking into your building?
Install improved door locks
What are the Fire Extinguisher ratings?
A - Wood and Paper
B - Flammable Liquids
C - Electrical
D - Flammable Metals
What are the most common Fixed Systems for Fire Suppression?
Combine Fire Detectors with Fire Suppression systems.
What is RF desensitization?
When RF levels become to high that it can cause receivers in wireless units to become deaf.
What is TEMPEST-compliant?
Means that a computer system doesn't emit any significant amount of EMI or RFI
What are the different Control Types?
What are important administrative data policies to have in control?
Wiping - How is data removed from media?
Disposing - How are media are discarded when they are no longer needed.
Retention - How long must data be kept?
Storage - What is data kept and what security precaution are associated with its access?