Deception Flashcards

(34 cards)

1
Q

Social Engineering

what is Social Engineering

A

a non-technical strategy that attempts to manipulate individuals into performing certain actions or reveal confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

social engineering exploits what? name 3

A
  1. human nature
  2. taking advantage of people’s willingness to help
    3.preying on their weaknesses, such as greed or vanity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering

name 3 common types of social engineering attacks.

A
  1. Pretexting
  2. Something for something (quid pro quo)
    Identity fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering

what is Pretexting

A

when an individual lies to gain access to privileged data

EX: attacker pretends to need personal or financial data to confirm a pe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering

what is (quid pro quo)

A

Something for something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Engineering

what is Something for something (quid pro quo)

A

a request for personal information in exchange for something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

Identity fraud

A

use of a person’s stolen identity to obtain goods or services by deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering

Social Engineering Tactics name 7

A
  1. authority
    2.intimidation
    3.consensus
    4.scarcity
    5.urgency
    6.familiarity
    7.trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering

authority is?

A

instructed by someone they perceive as an authority figure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Engineering

intimidation is

A

bullying a victim into taking an action that compromises security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social Engineering

consensus is?
Often called ‘social proof,

A

act in the same way as other people around them, thinking that something must be right if others are doing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering

scarcity is

A

to act when they think there is a limited quantity of something available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social Engineering

urgency is

A

to act when they think there is a limited time to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering

familiarity is

A

to do what another person asks if they like this person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Engineering

trust is

A

Building trust in a relationship with a victim it may require more time to establish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Engineering

17
Q

Shoulder Surfing and Dumpster Diving

what is Shoulder surfing

A

a simple attack that involves observing or looking over a target’s shoulder

18
Q

Shoulder Surfing and Dumpster Diving

what is dumpster diving

A

the process of going through a target’s trash to see what information has been thrown out.

19
Q

Impersonation and Hoaxes

20
Q

Impersonation and Hoaxes

21
Q

Impersonation and Hoaxes

22
Q

Impersonation and Hoaxes

what is Impersonation

A

act of tricking someon into doing something they would not ordinarily do, by pretending to be someone else.

23
Q

Impersonation and Hoaxes

what is Hoaxes

A

an act intended to deceive or trick someone

24
Q

hoaxes can cause just as much desruption as what?

A

security breach

25
# Piggybacking and Tailgating what isPiggybacking or tailgating
when a criminal follows an authorized person to gain physical entry into a secure location or a restricted area.
26
# Piggybacking or tailgating Criminals can achieve Piggybacking or tailgating by? name 3
1. Giving the appearance of being escorted into the facility by an authorized person. 2. Joining and pretending to be part of a large crowd that enters the facility. 3. Targeting an authorized person who is careless about the rules of the facility.
27
# Other Methods of Deception tricks to deceive their vicims. name 5
1.invoice scam 2.watering hole attack 3.typosquatting 4.prepending 5.influence campaigns
28
# Other Methods of Deception what is invoice scam?
Fake invoices with the goal of receiving money from a victim
29
# Other Methods of Deception what is a watering hole attack?
an exploit in which an attacker observes or guesses what websites an organization uses most often infects one or more of them with malware.
30
# Other Methods of Deception what is typosquatting
relies on common mistakes such as typos made by individuals when inputting a website address into their browser.
31
# Other Methods of Deception what is prepending
removal of ‘external’ email tag used by organizations to warn the recipient that an email has originated from an external source.
32
# Other Methods of Deception what is influence campaigns
well coordinated and blend various methods such as fake news, disinformation campaigns and social media posts.
33
# Other Methods of Deception influence campaigns is often used in what?
cyberwarfare
34
# Defending Against Deception tips to prevent social engineering tactics. name 6
1. Never disclose confidential information or credentials via email, chat, text messages, in person or over the phone to unknown parties. 2. Resist the urge to click on enticing emails and web links. 3. Be wary of uninitiated or automatic downloads. 4.Establish and educate employees on key security policies. 5.Encourage employees to take ownership of security issues. 6.Do not give in to pressure by unknown individuals.