Sec+ Chapter 04: Social Engineering, Physical, and Password Attacks Flashcards

(36 cards)

1
Q

Social engineering

A

The practice of manipulating people to accomplish a desired action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

7 social engineering principles

A

1) Authority

2) Intimidation

3) Consensus

4) Scarcity

5) Familiarity

6) Trust

7) Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Fraudulent acquisition credentials, sensitive PII, etc

Usually done over email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smishing

A

Phishing via SMS text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Phishing over the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spearphishing

A

Targets specific individuals or groups to gather desired information or access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

Aimed at senior employees like CEOs and CFOs (the big fish)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing defense

A

Security awareness

Reputation tools

Spam filters on email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Credential harvesting

A

The process of gathering credentials like user / pass combos

Often done via phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

Attack that redirects traffic from legit sites to bad ones

Requires altered DNS entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Typosquatting

A

Misspelled and slightly off, but similar, to legit website URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering hole attacks

A

Attacks on websites users frequent to infect them there, and they take it back home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spam

A

Unsolicited or junk email

Employs SE techniques to get you to open a message or click a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SPIM

A

Spam over IM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dumpster diving

A

Retrieving potentially sensitive information from a dumpster or trash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dumpster diving defense

A

Use secure disposal services for documents, secure dumpsters, ensure trash doesn’t have sensitive info in it

17
Q

Shoulder surfing

A

Looking over a person’s shoulder, through mirrors, etc, etc to capture info

18
Q

Shoulder surfing defense

A

Security awareness

Security screens

Polarized screen covers

19
Q

Tailgating

A

Following someone who has authorized access into an area as they open secure doors.

20
Q

Tailgating defnese

A

Make anyone present show credentials if they follow you in

21
Q

Elicitation

A

Technique to gather info without targets realizing they’re providing it

22
Q

Elicitation defense

A

Be aware, don’t be an idiot

23
Q

Prepending

A

Adding expression or phrase to emails to make it look like it passed spam filter

24
Q

Pretexting

A

Using a made up scenario to justify why you’re approaching an individual

25
Identity fraud / theft
The illicit use of someone else's identity
26
Hoaxes
Intentional falsehoods
27
Invoice scam
Sending fake invoices to organizations in the hopes of receiving payment
28
Brute force attack
An attack that iterates through passwords until you find one that works
29
Password spraying
Brute force attack that attempts to use a single password or small set of passwords against many accounts
30
Dictionary attacks
Brute force attack that uses a word list for its attempts
31
Hashing
One-way cryptographic function that takes an input and generates a unique, repeatable output
32
Malicious flash drive attacks
Drop flash drives in a place where they'll be picked up and plugged in by victim Drives will have malicious code / programs on them
33
Malicious USB cables
Cables that can capture keystrokes, capture data, or deploy malware
34
Card cloning
Focuses on capturing information from cards like RFID and magnetic stripes often used for entry access
35
Skimming
Attacks that use hidden or fake readers to skim cards
36
Supply chain attacks
Attacks that compromise devices, systems, or software before it ever reaches and organization