J.Dion Sec. 5 Social Engineering Flashcards
(39 cards)
Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.
Social engineering
What are the 6 main types social engineers use?
Authority
Urgency
Social proof
Scarcity
Likability
Fear
The power or right to give orders, make decisions, and enforce obedience.
Authority
Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions.
Urgency
Psychological phenomenon where individuals look to the behaviors and actions of other to determine their own decisions or actions in similar situations.
Social proof
Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply.
Scarcity
It is associated with being nice, friendly, and socially accepted by others.
Likability
Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening.
Fear
What are the four main forms of impersonation used by attackers?
Impersonation
Brand impersonation
Typosquatting
Watering Hole Attacks
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data.
Impersonation
Specific form of impersonation where an attacker pretends to represent a legitimate company or brand.
Brand Impersonation
A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical error.
Typosquatting
Typosquatting is also known as 2 other names
URL hijacking
Cyber-squatting
Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use.
Watering hole attacks
What are the 6 types of phishing attacks?
Phishing
Vishing
Smishing
Whaling
Spear phishing
Business email compromise
Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers.
Phishing
Used by cybercriminals who are more tightly focused on a specific group of individuals or organizations.
Spear phishing
“Spray and pray” mode?
Phishing
Targeted users mode?
Spear phishing
Form of spear phishing that targets high-profile individuals like CEOs or CFOs.
Whaling
Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker.
Business email compromise (BEC)
Phone-based attack in which the attacker deceives victims into divulging personal or financial information.
Vishing (Voice phishing)
Attack that uses text messages to deceive individuals into sharing their person information.
Smishing (SMS phishing)
Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training.
Anti-phishing compaign