Social Engineering Flashcards

(35 cards)

1
Q

Manipulative strategy that exploits human psychology to gain unauthorized access to systems, data, or physical spaces. To manipulate users with motivational triggers to execute malicious actions.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The six main types of motivational triggers for social engineering.

A
  1. Authority
  2. Urgency
  3. Social Proof
  4. Scarcity
  5. Likability
  6. Fear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The power or right to give orders, make decisions, & enforce obedience.

A

Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions.

A

Urgency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Psychological phenomenon where individuals look to the behaviors & actions of others to determine their own decisions or actions in similar situations.

A

Social Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply.

A

Scarcity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is associated with being nice, friendly, & socially accepted by others.

A

Likability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Feeling afraid of someone or something, as likely to be dangerous, painful, or threatening.

A

Fear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Specific form of impersonation where an attacker pretends to represent a legitimate company or brand.

A

Brand Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A form of cyber attack where an attacker registers a domain name that is similar to popular website but contains some kind of common typographical errors.

A

Typo-squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use.

A

Watering Hole Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Creating a fabricated scenario to manipulate targets or impersonating trusted figures to gain trust.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords & credit card numbers.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phone-based attack in which the attacker deceives victims into divulging personal or financial information.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack that uses text messages to deceive individuals into sharing their personal information.

17
Q

Form of spear Phishing that targets high-profile individuals, like CEOs or CFOs.

18
Q

Used by cyber-criminals who are more tightly focused on a specific group of individuals or organizations.

A

Spear Phishing

19
Q

An advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker.

A

Business Email Compromise

20
Q

Vital tool for educating individuals about phishing risks and how to recognize potential phishing attempts in user security awareness training.

A

Anti-phishing Campaign

21
Q

The wrongful or criminal deception intended to result in financial or personal gain.

22
Q

The use by one person of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person.

A

Identity Fraud

23
Q

The attacker tries to fully assume the identity of their victim.

A

Identity Theft

24
Q

A fraudulent or deceptive act or operation.

25
A scam in which a person is tricked into paying for a fake invoice for a service or product that they did not order.
Invoice Scam
26
Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group.
Influence Campaign
27
Inaccurate information shared unintentionally.
Misinformation
28
Intentional spread of false information to deceive or mislead.
Disinformation
29
Manipulating a situation or creating a distraction to steal valuable items or information.
Diversion Theft
30
Malicious deception that is often spread through social media, email, or other communication channels.
Hoax
31
Looking over someone's shoulder to gather personal information.
Shoulder Surfing
32
Searching through trash to find valuable information.
Dumpster Diving
33
The process of secretly listening to private conversations. The perpetrator intercepts the communication between two parties without their knowledge.
Eavesdropping
34
Planting a malware-infected device for a victim to find and unintentionally introduce malware to their organization's system.
Baiting
35