Human Element Security Flashcards
Social engineering and types of attacks (33 cards)
HUMINT
Information that can be gathered by talking to people.
OSINT
Information collected from publicly available sources such as job posting, and public records.
Some sources of OSINT are resume and job posting, social media, public records, Google hacking, metadata.
Metadata
Data about data that can be found in every file like the timestamps or locations, etc.
Geospatial Intelligence(GEOINT)
Geographical information typically from satellites.
Measurement & Signature Intelligence(MASINT)
Measurement and signature data from sensors, such as optical and weather readers.
Signal Intelligence(SIGINT)
Data gathered by intercepting signals between people and systems.
Technical Intelligence (TECHINT)
Intelligence about equipment, technology, and weapons often for the purpose of developing countermeasures.
Financial Intelligence (FININT)
Data about financial dealings and transactions of companies and individuals.
Cyber Intelligence/Digital Network Intelligence (CYBINT/DNINT)
Information gathered from computer systems and networks.
Social Engineering
Manipulate people to gain information or access to facilities by gaining their trust or pretending to be someone they are not.
Pretexting
attacker use information they collected to pretend and act as if they are a manager, customer, reporter, co-worker’s family member, or other trusted person. They create a believable scenario that convince their targets to give up sensitive information or perform actions that usually they don’t for strangers.
Phishing
a social engineering technique in which an attacker uses electronic communications such as email, texting, or phone calls to collect the target’s personal information or install malware on their system often by convincing the target to click a malicious link.
Spear Phishing
To achieve a higher rate of success, attackers may turn to spear phishing which is targeted attacks against specific companies, organizations, or people. In spear phishing the attacker should plan everything strategically and should observe the target so the message appears to come from someone the target would trust such as human resources staff, a manager, the corporate IT support team, a peer or a friend.
Tailgaiting/Piggybacking
is following someone through an access control point such as secure door, instead of using the credentials, badge, or key normally needed to enter.
Cunning and flattery
Impersonating
masquerading as someone else such as a repair technician
Dumpster Diving
Searching through trash to gain information from discarded documents.Literally trash to find documents and devices!
Spam emails
unsolicited emails, commonly advertising emails, but sometimes phishing and scamming attempts.
Email Spoofing
is the forgery of an email header so that the email seems to be sent from a legitimate source.
Email pharming
a user will open an email with malware, which then installs malicious code on the user’s PC. Another way is that the malicious code changes the local hosts file on a personal computer and the code redirects any URL clicks to a fraudulent website without knowledge or consent. The website might look like a familiar website like your bank website and when you enter your username and password, they steal the information. It is pharming data.
Protocol spoofing
misuse of a network protocol to initiate an attack on a host or network device
ARP spoofing
Address Resolution Protocol(ARP) helps computers on a network figure out the MAC address of another computer based on its IP address. ARP poisoning modifies the network’s ARP cache to take over a victim’s MAC address. This allows attacker to receive any data intended for the victim.
DNS Spoofing
Domain Name Service(DNS) translates domain names into IP addresses. In DNS spoofing, the attacker alters the DNS records to redirect traffic to a fraudulent website, where further attacks can occur.
IP Address Spoofing
is an attack where a malicious user forges a packet’s source IP address and by doing so it impersonates the sending computer.