Section 4: Social Engineering Flashcards

1
Q

What is Social Engineering?

A

A manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Authority refer to in social engineering?

A

Leveraging perceived authority to compel compliance from targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of Urgency in social engineering?

A

Creating a sense of immediacy to provoke quick action from individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Social Proof influence targets?

A

Influencing decisions by showcasing the actions of others to persuade targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Scarcity in the context of social engineering?

A

Pressuring targets by highlighting limited availability of resources or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Likability mean in social engineering?

A

Gaining trust from targets by appearing friendly or relatable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Fear used in social engineering?

A

Using threats or potential consequences to force compliance from individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Impersonation?

A

Pretending to be someone else to gain unauthorized access to information or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Brand Impersonation?

A

Mimicking a legitimate company to deceive targets into providing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Typosquatting?

A

Registering domain names that are similar to legitimate ones to exploit common typing errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Watering Hole Attacks?

A

Compromising frequently visited websites of targets to deliver malware or phish for information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Pretexting?

A

Creating a false scenario to manipulate individuals into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phishing?

A

Deceptive communications designed to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Spear Phishing?

A

Targeted phishing attacks aimed at specific individuals or organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Whaling?

A

Phishing attacks that target high-profile individuals, such as executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Business Email Compromise (BEC)?

A

Using compromised internal emails to deceive employees into sharing confidential information.

17
Q

What is Vishing?

A

Phishing conducted via phone calls to extract sensitive information.

18
Q

What is Smishing?

A

Phishing executed through SMS or text messages to trick individuals into providing personal information.

19
Q

What are Frauds and Scams?

A

Deceptive practices intended to trick individuals into providing money or sensitive information.

20
Q

What is Identity Fraud/Theft?

A

Using someone else’s personal information for illegal activities.

21
Q

What are Invoice Scams?

A

Tricking individuals into paying fraudulent invoices.

22
Q

What are Influence Campaigns?

A

Coordinated efforts aimed at spreading misinformation or disinformation to sway public opinion or behavior.

23
Q

What is Diversion Theft?

A

Creating distractions to steal items or information without being noticed.

24
Q

What are Hoaxes?

A

Spreading false information to deceive individuals or create panic.

25
What is Shoulder Surfing?
Observing someone’s screen or keyboard to gain sensitive information without their knowledge.
26
What is Dumpster Diving?
The practice of searching through trash or discarded materials to find valuable information or data.
27
What is Eavesdropping?
The act of secretly listening to private conversations, often to gather confidential or sensitive information.
28
What is Baiting?
A technique where infected devices, such as USB drives, are left in locations for victims to find and use, potentially compromising their systems.