2.0 Binary Sleuths and Social Architects - Exploring OSINT and SE PowerPoint

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Open-Source Intelligence (OSINT)

The process of collecting and analyzing publicly available information to gather insights.

2
New cards

Cold War Era

Period during which OSINT was extensively used by both sides of the Iron Curtain to gauge military capabilities and political intentions.

3
New cards

Dissemination (in OSINT)

The reporting and distribution of analyzed intelligence to the intended recipients.

4
New cards

Social Engineering (SE)

Uses tactics to infiltrate systems via email, phone, text, or social media, often impersonating a person or agency in authority.

5
New cards

Pretexting

Fabricating scenarios to gain trust with the target.

6
New cards

Phishing

A cyber/social engineering attack where deceptive messages mimic legitimate sources to trick individuals into revealing sensitive information.

7
New cards

Spear Phishing

A targeted form of phishing where attackers tailor their messages to specific individuals or organizations.

8
New cards

Tailgating

A physical security breach by following an authorized access individual into a restricted area.

9
New cards

5 Main Steps of OSINT Action Plan

Preparation, Collection, Processing, Analysis, Dissemination.

10
New cards

Psychological Principles in Social Engineering

Tactics like fear, urgency, greed, and authority are leveraged to manipulate individuals into revealing sensitive information.

11
New cards

Kevin Mitnick

A well-known hacker who became a security consultant after serving prison time for multiple hacking offenses.

12
New cards

Baiting

A tactic that entices victims with an attractive offer or item to trick them into revealing sensitive information or downloading malware.

13
New cards

Quid Pro Quo

Offering something in exchange for sensitive information, thereby leveraging reciprocity.

14
New cards

Social Media Scraping

The technique of collecting information from public profiles and posts on social media platforms.

15
New cards

Advanced Persistent Threat (APT)

Groups incorporating social engineering into sophisticated attack strategies.

16
New cards

Urgency

Creating a sense of immediate action pressure that causes individuals to make quick decisions without thorough consideration.

17
New cards

Digital Footprint

The trail of data that individuals leave behind when using the internet, which can be analyzed for insights.

18
New cards

Processing (in OSINT)

Organizing and converting collected data into usable formats for analysis.