Social Engineering Flashcards

(31 cards)

1
Q

What is Social Engineering?

A

Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the motivational triggers used by social engineers.

A
  • Familiarity and Likability
  • Consensus and Social Proof
  • Authority and Intimidation
  • Scarcity and Urgency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is impersonation in the context of social engineering?

A

Pretending to be someone else to gain unauthorized access to resources or sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pretexting?

A

Creating a fabricated scenario to manipulate targets and impersonating trusted figures to gain trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the types of phishing attacks?

A
  • Phishing
  • Vishing
  • Smishing
  • Spear Phishing
  • Whaling
  • Business Email Compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define frauds and scams.

A

Deceptive practices to deceive people into parting with money or valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are influence campaigns?

A

Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name a few other social engineering attacks.

A
  • Diversion Theft
  • Hoaxes
  • Shoulder Surfing
  • Dumpster Diving
  • Eavesdropping
  • Baiting
  • Piggybacking
  • Tailgating
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the authority motivational trigger imply?

A

Most people comply with requests if they believe it comes from someone in a position of authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the urgency motivational trigger?

A

A compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain social proof as a motivational trigger.

A

Individuals look to the behaviors and actions of others to determine their own decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is scarcity in the context of social engineering?

A

Psychological pressure people feel when they believe a product or opportunity is limited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does likability refer to in social engineering?

A

Most people prefer to interact with those they like, which can be exploited by social engineers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the fear motivational trigger.

A

Attacks focused on creating a threat that if the target does not comply, something bad will happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is brand impersonation?

A

A specific form of impersonation where an attacker pretends to represent a legitimate company or brand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is typosquatting?

A

A form of cyber attack where an attacker registers a domain name similar to a popular website with typographical errors.

17
Q

What are watering hole attacks?

A

Targeted attacks where attackers compromise a specific website that their target is known to use.

18
Q

Define phishing.

A

Sending fraudulent emails that appear to be from reputable sources to convince individuals to reveal personal information.

19
Q

What is spear phishing?

A

A more targeted form of phishing aimed at specific individuals or organizations.

20
Q

What is whaling in phishing attacks?

A

A form of spear phishing targeting high-profile individuals like CEOs or CFOs.

21
Q

What is Business Email Compromise (BEC)?

A

A sophisticated phishing attack targeting businesses using internal email accounts to conduct unauthorized actions.

22
Q

What is vishing?

A

Voice phishing where attackers trick victims into sharing personal information over the phone.

23
Q

What does smishing involve?

A

Using text messages to trick individuals into providing personal information.

24
Q

Fill in the blank: The most common type of fraud seen online is known as _______.

A

identity fraud or identity theft.

25
What is the difference between identity fraud and identity theft?
* Identity fraud: uses personal information for financial gain. * Identity theft: fully assumes the identity of the victim.
26
What are hoaxes in social engineering?
Malicious deceptions often spread through social media or email, sometimes paired with phishing.
27
What is shoulder surfing?
Looking over someone's shoulder to gather personal information.
28
Define dumpster diving.
Searching through trash to find valuable information, such as discarded documents.
29
What is eavesdropping?
Secretly listening to private conversations without the knowledge of the parties involved.
30
What is baiting in social engineering?
Leaving a malware-infected device in a place where it will be found by a victim.
31
Differentiate between piggybacking and tailgating.
* Piggybacking: unauthorized person convinces an authorized employee to let them in. * Tailgating: unauthorized person follows an authorized employee into a secure area.