MTHS - Cyber Security - expanded Social engineering

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Crosscut shredder

A device that cuts paper both vertically and horizontally, turning the paper into confetti.

Strip-cut shredder

A device that cuts paper into long, thin strips.

Cybercriminal

A hacker willing to take more risks because the payoff is higher, often associated with large organized crime syndicates such as the mafia.

Scrubbing

A lock picking method that involves running a pick over all the pins with carefully calculated pressure.

Likeability

Likeability works well because humans tend to do more to please a person they like as opposed to a person they don't like.

Shoulder surfing

Looking over someone's shoulder while they work on a computer or review documents. This attack's purpose is to obtain usernames, passwords, account numbers, or other sensitive information.

Hoax

Malicious email with some type of urgent or alarming message to deceive the target. However, ____________ emails use a variety of tactics to convince the target they're real.

Social engineering

An attack involving human interaction.

Being a good listener

An attacker may approach a target and carefully listen to what the target has to say, validate any feelings they express, and share similar experiences (which may be real or fabricated). The point is to be relatable and sympathetic. As the target feels more connected to the attacker, barriers go down and trust builds, leading the target to share more information.

Offering something for very little to nothing

An attacker promising huge rewards if the target is willing to do a very small favor or share what the target thinks is a very trivial piece of information.

Nation State

Are highly targeted, Identify a target and wage an all-out war, Are extremely motivated.Use the most sophisticated attack techniques of all the attackers. This often includes developing completely new applications and viruses in order to carry out an attack. Are well financed.

USB and keyloggers

As the target logs in, the username and password are saved. Later, the attacker uses the username and password to conduct an exploit.

Misinformation

Attackers might make a statement with the wrong details. The attacker's intent is that the target will give the accurate details that the attacker wanted to confirm. The more precise the details given by the attacker, the better the chance that the target will take the bait.

Feigning ignorance

Attackers might make a wrong statement and then admit to not knowing much about the subject. This statement will hopefully get the target to not only correct the attacker, but also explain why the attacker is wrong in detail.

Innate human trust

Attackers often exploit a target's natural tendency to trust others. The attacker wears the right clothes, has the right demeanor, and speaks words and terms the target is familiar with so that the target will comply with requests out of trust.

BIOS access attack

Attacks have been around for a long time, but should not be overlooked. This attack usually involves changing the boot order on a PC so that the hacker can gain access to the computer by bypassing the installed operating system.

Script kiddie

Hacker who uses scripts written by much more talented individuals.

Hacktivist

Hacker with a political motive.

Bump key

Cut to the number nine position with some of the front and shank removed.

SMiShing

Doing phishing through SMS.

Pretexting

Doing research and information gathering to create convincing identities, stories, and scenarios to be used on selected targets.

Environment

For attacker to extract information, talk to the target in a relaxing, open, well lit place that feels safe to the target. Do not sit between the target and the door to avoid the target feeling trapped.

Cold boot attack

The attacker enters the facility and extracts data remanence from RAM that might still be available before the system is completely powered off.

social engineering process - Research

The attacker gathers information about the target organization. Attackers use a process called footprinting, which is using all resources available to gain information.

Badge cloning

The attacker gets close enough to the legitimate card to read it. Once the card information is read, the attacker can easily clone it.

Authority

The attacker pretends to be or acting for a superior with enough power that the target will comply right away without question. _________________ is often combined with fear. If an ____________ figure threatens a target with being fired or demoted, the target is more likely to comply without a second thought.

Spam and spim

The attacker sends an email or banner ad embedded with a compromised URL that entices a user to click it. ________is similar, but the malicious link is sent to the target using instant messaging instead of email.

social engineering process - Exploitation

The attacker takes advantage of the relationship with the target and uses the target to extract information, obtain access, or accomplish the attacker's purposes in some way.

Interrogation

The attacker talks about the target's statements. The attacker is mostly leading the conversation with questions and statements that will flow in the direction the attacker has in mind to obtain information.

Social proof

The attacker uses social pressure to convince the target that it's okay to share or do something. In this case, the attacker might say, "If everybody is doing it, then it's okay for you to do it, too."

Ignorance

The target is not educated in social engineering tactics and prevention, so the target can't recognize social engineering when it is happening. The attacker knows this and exploits the ignorance to his or her advantage.

Interview

the attacker lets the target do the talking while the attacker mostly listens. In this way, the attacker has the chance to learn more about the target and how to extract information from them.

Urgency

To create a sense of urgency, an attacker fabricates a scenario of distress to convince an individual that action is immediately necessary.

Feigning

To pretend to have a feeling or condition. Faking it.

Threatening

When they intimidate a target with threats convincing enough to make them comply with the attacker's request.

Bollard

A physical barrier to deter aggressive intruders.

Differential backup

A process that backs every file that's changed since the last full backup.

Incremental backup

A process that backs up every file that's changed since the last full or incremental backup.

Full backup

A process that backs up every piece of an organization's data.

White hat hacker

A professional who helps companies see the vulnerabilities in their security.

Elicitation

A technique that tries to extract information from a target without arousing suspicion.

Elicitation

A technique to extract information from a target without arousing suspicion.

Lock shim

A thin and stiff piece of metal used to open a padlock.

Moral obligation

An attacker uses moral obligation to exploit the target's willingness to be helpful and assist them out of a sense of responsibility.

National Institute of Standards and Technology (NIST)

An institute that publishes and standardizes the security controls and assessment procedures to protect the integrity of information systems.

Eavesdropping

An unauthorized person listening to private conversations between employees or other authorized personnel when sensitive topics are being discussed.

Hacker

Any threat actor who uses technical knowledge to bypass security, exploit a vulnerability, and gain access to protected information.

Scarcity

Appeals to the target's greed. If something is in short supply and will not be available, the target is more likely to fall for it.

Insider

Employee that for a variety of reasons uses their position to gain access to unauthorized computer information.

Observation

Every part of the human body can give a clue about what is going on inside the mind. Most people don't even realize they give many physical cues, nor do they recognize these cues in others. A skilled observer pays close attention and puts these clues together to confirm another person's thoughts and feelings.

Preloading

Influencing a target's thoughts, opinions, and emotions before something happens.

social engineering process - Development

Phase involves two parts: selecting individual targets within the organization being attacked and forming a relationship with the selected targets.

Impersonation

Pretending to be trustworthy and having a legitimate reason for approaching the target to ask for sensitive information or access to protected systems.

Footprinting

Similar to stalking, but in a social engineering context. Including going through the target organization's official websites and social media; performing dumpster diving; searching sources for employees' names, email addresses, and IDs; going through a organization tour; and other kinds of onsite observation.

Spim

The malicious link is sent to the target over instant messaging instead of email.

Compliments

_________________ about something they know the target did in hopes that the target will take the bait and elaborate on the subject. Even if the target downplays the skill or ability involved, talking about it might give the attacker valuable information.

Common ground and shared interest

____________________________________________________ work because sharing a hobby, life experience, or problem instantly builds a connection and starts forming trust between two parties.


संबंधित स्टडी सेट्स

1.6 Real Estate The Business of Value

View Set

A&P Chapter 12: The Axial Skeleton

View Set

Science 1010 Test 2 (Chapters 3 and 4)

View Set