Social Engineering Flashcards
(35 cards)
Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces. To manipulate users with motivational triggers to execute malicious actions.
Social Engineering
The six main types of motivational triggers for social engineering.
- Authority
- Urgency
- Social Proof
- Scarcity
- Likability
- Fear
The power or right to give orders, make decisions, & enforce obedience.
Authority
Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions.
Urgency
Psychological phenomenon where individuals look to the behaviors & actions of others to determine their own decisions or actions in similar situations.
Social Proof
Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply.
Scarcity
It is associated with being nice, friendly, & socially accepted by others.
Likability
Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening.
Fear
An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data.
Impersonation
Specific form of impersonation where an attacker pretends to represent a legitimate company or brand.
Brand Impersonation
A form of cyber attack where an attacker registers a domain name that is similar to popular website but contains some kind of common typographical errors.
Typo-squatting
A Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use.
Watering Hole Attacks
Creating a fabricated scenario to manipulate targets or impersonating trusted figures to gain trust.
Pretexting
Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords & credit card numbers.
Phishing
Phone-based attack in which the attacker deceives victims into divulging personal or financial information.
Vishing
Attack that uses text messages to deceive individuals into sharing their personal information.
Smishing
Form of spear Phishing that targets high-profile individuals, like CEOs or CFOs.
Whaling
Used by cyber-criminals who are more tightly focused on a specific group of individuals or organizations.
Spear Phishing
An advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker.
Business Email Compromise
Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training.
Anti-phishing Campaign
The wrongful or criminal deception intended to result in financial or personal gain.
Fraud
The use by one person of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person.
Identity Fraud
The attacker tries to fully assume the identity of their victim.
Identity Theft
A fraudulent or deceptive act or operation.
Scam