Social Engineering Techniques Flashcards

(33 cards)

1
Q

Phishing

A

social engineering technique where attacker tricks user into responding to something (ex. email) to instance a malware-based attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

phishing via text message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

phishing via phone calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

unwanted and unsolicited digital mail sent out in bulk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spim

A

spam over instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

targeted phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster Diving

A

act of going through the garbage at an organization in order to find sensitive information that could possibly compromise a network and its resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder Surfing

A

act of looking over a persons shoulder to gather sensitive information from an individuals device/desk (can include looking through windows w/ binoculars)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A

following closely behind someone to gain unauthorized access to a physical building or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting Information

A

the act of casual conversation to extract information from a victim w/out giving the impression that they are being interrogated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

targeting a higher up w/ a phishing attack (ex. CEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Fraud

A

the act of stealing someones identity and pretending to be them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice Scams

A

scams over the phone that attempt to gain sensitive/personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential Harvesting

A

act of stealing or obtaining a persons login information (credentials) to attack a system

17
Q

Reconnaissance

A

act of gathering information about an intended victim/target to prepare for an attack

18
Q

Hoax

A

faking an event or alert in order to obtain information from a target victim

19
Q

Impersonation

A

pretending to be someone else in order to obtain sensitive/personal information from someone

20
Q

Watering Hole Attack

A

infecting a website w/ malware that users usually trust and use (specifically, one an organization may use)

21
Q

Typosquatting (URL Hijacking)

A

act of using purposely misspelled domains (ones that are commonly misspelled) for malicious purposes (ex. gooogle.com or favebook.com)

22
Q

Pretexting

23
Q

Influence campaigns and the two types

A

large scale campaigns that attempt to shift public opinion (hybrid warfare and social media)

24
Q

Hybrid warfare

A

influence campaign that…

25
Social media
influence campaign that...
26
Principles and the seven types
reasons for attack effectiveness. Authority, intimidation, consensus, scarcity, familiarity, trust, urgency.
27
Authority
(principle) pretending to be someone in power to pressure a response or action from a victim (ex. CEO)
28
Intimidation
(principle) threatening or blackmailing someone into giving up information
29
Consensus
(principle) when an attackers claims that an action is normal or generally accepted
30
Scarcity
(principle) focuses on the fact that people are more likely to find value in things that are less available
31
Familiarity
(principle) creating a sense of familiarity w/ a user to take advantage of them
32
Trust
(principle) creating a bond to gain the users trust in order to take advantage of them
33
Urgency
(principle) claiming that something is urgent and that the intended target needs to "act fast" to pressure them to perform an action