Chapter 4: Social Engineering

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

authority

1 / 33

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

34 Terms

1

authority

most people will obey someone who appears to be in charge or knowledgeable regardless of whether or not they actually are.

New cards
2

intimidation

scaring or bullying an individual into taking a desired action

New cards
3

consensus-based

social engineering uses the fact that people tend to want to do what others are doing to persuade them to take an action.

New cards
4

Scarcity

used for social engineering in scenarios that make something look more desirable because it may be the last one available.

New cards
5

Familiarity based

attacks rely on you liking the individual or even the organization the individual is claiming to represent.

New cards
6

Trust

relies on a connection with the individual they are targeting

New cards
7

Urgency

creating a feeling that the action must be taken quickly due to some reason or reasons.

New cards
8

Phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

New cards
9

Smishing

Phishing attacks committed using text messages (SMS).

New cards
10

Vishing

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

New cards
11

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

New cards
12

Whaling

A phishing attack that targets only wealthy individuals.

New cards
13

credential harvesting

gathering credentials like usernames and passwords

New cards
14

Pharming

An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.

New cards
15

Typosquatting attacks

use misspelled and slightly off but similar to the legitimate site URLs to conduct Typosquatting attacks

New cards
16

Spam

unsolicited email

New cards
17

Spam over Instant Messaging (spim)

Unsolicited messages sent over an instant messaging service, such as Windows Messenger. (16)

New cards
18

dumpster diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

New cards
19

Shoulder surfing

the process of looking over a person's shoulder to capture information like passwords or other data.

New cards
20

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

New cards
21

Eliciting Information

is a technique used to gather information without targets realizing they are providing it.

New cards
22

Pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual

New cards
23

identity fraud

a crime where one person uses another person's personal data, without authorization, to deceive or defraud someone else

New cards
24

online influence campaigns

traditionally focused on social media, email and other online-centric mediums, have become part of what has come to be called hybrid warfare

New cards
25

Hybrid Warfare

- Combining conventional warfare with cyberwarfare

New cards
26

Password Attacks

Attempt to discover or bypass passwords used for authentication on systems and networks, and for different types of files

New cards
27

Brute force attacks

Exhausts all possible password combinations to break into an account

New cards
28

Password Spraying attacks

a type of brute force attack that attempts to use a single password or small set of passwords against many accounts.

New cards
29

Dictionary attacks

compare passwords to a list of common words, and can search for multiword phrase combinations

New cards
30

Physical attacks

Attack vector that trumps logical, leverage remote device physical access to gain access to other devices on a network

New cards
31

Malicious USB cables and flash drives

a device crafted to perform unwanted activities against a computer and/or mobile device or peripheral without the victim realizing the attack is occurring. Attacks include exfiltrating data and injecting malware.

New cards
32

Card Cloning attacks

Focus on capturing information from cards like RFID and magnetic stripe cards often used for entry access.

New cards
33

Skimming attacks

use hidden or fake readers or social engineering and hand-hed readers to capture card and then employ cloning tools to use credit cards and entry access cards for their own purposes.

New cards
34

Supply chain attacks

A cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain.

New cards

Explore top notes

note Note
studied byStudied by 110 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 55 people
Updated ... ago
5.0 Stars(4)
note Note
studied byStudied by 45 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 959 people
Updated ... ago
5.0 Stars(4)

Explore top flashcards

flashcards Flashcard85 terms
studied byStudied by 64 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard138 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard79 terms
studied byStudied by 81 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 100 people
Updated ... ago
5.0 Stars(8)
flashcards Flashcard66 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard48 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)