Social Engineering Flashcards
(50 cards)
What is the first type of motivational trigger used by social engineers?
Authority
Most people comply with requests from those they perceive as authority figures.
What does the urgency trigger in social engineering refer to?
A compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly
This trigger causes people to prioritize certain actions due to perceived time constraints.
Define social proof in the context of social engineering.
A psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions
This often occurs in situations where individuals are uncertain about how to act.
What psychological pressure is associated with the scarcity trigger?
The feeling that a product, opportunity, or resource is limited or in short supply
This trigger can lead individuals to act quickly to secure what they perceive as scarce.
How does likability function as a motivational trigger in social engineering?
Most people want to interact with people they like
Social engineers may leverage sexual attraction, pretend to be a friend, or highlight common interests.
What is the focus of fear as a motivational trigger in social engineering attacks?
Threatening individuals with negative consequences if they do not comply
This approach often includes warnings of bad things happening if instructions are not followed.
What is impersonation in the context of cyber attacks?
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data
Attackers collect information about the organization to earn the trust of their targeted users.
What is required for an impersonation attack to be effective?
The attacker must collect information about the organization to earn the trust of targeted users
Attackers provide details to make their lies and impersonation more believable.
Define brand impersonation.
A specific form of impersonation where an attacker pretends to represent a legitimate company or brand
Attackers use the brand’s logos, language, and information to create deceptive communications or websites.
What is typosquatting?
A form of cyber attack where an attacker registers a domain name similar to a popular website but with common typographical errors
Also known as URL hijacking or cybersquatting.
Explain what a watering hole attack is.
A targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use
The term is a metaphor for a naturally occurring phenomenon, where the ‘watering hole’ is usually a trusted website or online service.
True or False: Typosquatting is also referred to as brand impersonation.
False
Typosquatting is also known as URL hijacking or cybersquatting.
Fill in the blank: _______ is a form of impersonation where an attacker pretends to represent a legitimate company.
[brand impersonation]
List the four main forms of impersonation used by attackers.
- Impersonation
- Brand Impersonation
- Typosquatting
- Watering Hole Attacks
What is pretexting?
Gives some amount of information that seems true so that the victim will give more information
Pretexting is often used in social engineering attacks to manipulate individuals into divulging confidential information.
What is phishing?
Sending fraudulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers
Phishing is one of the most common cyber attack methods.
What is spear phishing?
More targeted form of phishing that is used by cybercriminals who are more tightly focused on a specific group of individuals or organizations
Spear phishing typically has a higher success rate compared to general phishing.
What is whaling in the context of phishing attacks?
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
Whaling is aimed at obtaining sensitive information from key decision-makers.
What is the primary goal of whaling attacks?
To compromise an executive’s account for subsequent attacks within their organization
The rewards for successful whaling can be significantly higher due to the access gained.
What is Business Email Compromise (BEC)?
Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform malicious actions
BEC attacks often exploit trust within the organization.
What is vishing?
Attacker tricks their victims into sharing personal or financial information over the phone
Vishing is a form of social engineering that exploits human psychology.
What is smishing?
Involves the use of text messages to trick individuals into providing their personal information
Smishing combines SMS technology with phishing tactics.
What is an Anti-phishing Campaign?
An essential user security awareness training tool to educate individuals about phishing risks and identifying potential phishing attempts
This campaign is designed to improve user awareness and reduce the likelihood of falling victim to actual phishing attacks.
What should an Anti-phishing Campaign offer to users who fell victim to simulated phishing emails?
Remedial training
This training aims to reinforce learning and help users recognize and avoid real phishing attempts in the future.