Social Engineering Flashcards

1
Q

What are the 4 best strategies to use for Identity mitigation

A

Avoidance - avoid uploading identity info, not always possible
Compartmentalisation - Aliases for different socials
Content - carefully consider what info is released
Audience - E.g. Keep work and friends separate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some decentralised social networks

A

Friendica
GNU social network
Diaspora

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Bugmennot.com

A

A site that provides usernames and passwords to sign into websites that require a sign up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some disposable email genrators

A

Geurillamail
Dispostable
Mailinator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some temp email generators

A

Anonbox
Freemail.ms
10minutemail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Receive-SMS-online

A

A site that provides phone numbers for verification processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some behavioural security controls that can be implemented

A

1) Never enter sensitive info
2) never dwnld from an untrusted source
3) Validate sender and attachment
4) Minimise personal info disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some behavioural security controls that can be implemented

A

1) Never enter sensitive info
2) never dwnld from an untrusted source
3) Validate sender and attachment
4) Minimise personal info disclosure`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some techincal security controls that can be implemented

A

1) Email client w security
2) Isolation & Compartmentalisation
3) Using a VM/Sandbox
4) Opening attachments online
5) Use Live OS
6) Anti-virus and end-point protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can URLvoid.com be used for

A

Database of all websites reported to be malicious or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can WhoIs.com be used for

A

Used to identify whos behind a website like companies on the gov website
Reverse IP search to see what other sites the server is hosting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is it important to have separate physical and virtual security domains?

A

High levels of security are not practical for day-to-day use
Back-ups
Plausible deniability
Isolation & Compartmentalisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some virtual security domains?

A

Dual booting
Platform virtualisation / Hypervisors
Hidden OS
Non-persistent / Live OS like Tails
Bootable USBs
Virtual seperation e.g. QubesOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly