- Barajar
ActivarDesactivar
- Alphabetizar
ActivarDesactivar
- Frente Primero
ActivarDesactivar
- Ambos lados
ActivarDesactivar
- Leer
ActivarDesactivar
Leyendo...
Cómo estudiar sus tarjetas
Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda
Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba
Tecla H: Muestra pista (3er lado).tecla h
Tecla N: Lea el texto en voz.tecla n
Boton play
Boton play
33 Cartas en este set
- Frente
- Atrás
Social engineering.
|
is the process by which an attacker seeks to extract useful information from users, often by just tricking them into helping the attacker.
|
impersonation
|
A core tactic of social engineers, which simply means someone assumes the character or appearance of someone else
|
What kind of information use an attacker to do reconnaissance of the target?.
|
usually the attacker uses public information sources to first do reconnaissance of the target.
|
Identity fraud
|
The use of a person’s personal information without authorization to deceive or commit a crime.
|
the best defense against social engineering?
|
is ongoing user awareness and education.
|
Tailgating
|
Following closely behind someone who has
authorized physical access in an environment |
Control of tailgating
|
Many high-security facilities employ mantraps (airlocklike mechanisms that allow only one person to pass at a time) to provide entrance control and prevent tailgating.
|
Dumpster Diving
|
They can extract sensitive information from the garbage without ever contacting anyone in the organization.
A technique used by an attacker that involves gathering useful information from discarded data |
Shoulder surfing
|
Looking over someone’s shoulder to obtain information
|
What do phishing and related attacks rely in?
|
rely on technical methods to accomplish the goals
|
What people tend to in?
|
People tend to trust others.
People tend to want to be helpful to those in need |
Phishing and Variants
These techniques by themselves are first and foremost about |
eliciting information that can directly or indirectly lead to sensitive data loss or other compromise
|
Cada vez más, social engineering attacks are being
conducted: |
Electronically
|
True or False
Social engineering conducted via computer systems has different names depending on the target and the method. |
True
|
Que es SPIM
|
spam over Internet messaging
A type of unsolicited messaging that is specifically sent over instant messaging platforms. |
What is phishing
|
Phishing is an attempt to acquire sensitive information by masquerading as a trustworthy entity via electronic communication.
|
What is prepending
|
Muchas organizaciones ahora anteponen a la línea de asunto algún tipo de notificación si el correo electrónico es externo.
|
Variants of Phishing
|
Spear phishing
Whaling Vishing Smishing Pharming |
Spear phishing
|
This is a targeted version of phishing. Whereas phishing often involves mass emailing, spear phishing goes after a specific individual.
|
Whaling
|
Whaling is identical to spear phishing, except for the size of the fish. Whaling employs spear phishing tactics but goes after high profile targets, such as an executive within a company.
|
Vishing:
|
Also known as voice phishing, vishing is the use of fake caller ID to appear as a trusted organization and attempts to get an individual to enter account details via the phone.
|
Smishing
|
Also known as SMS phishing, smishing is the use of phishing methods through text messaging.
|
Pharming
|
This term is a combination of farming and phishing.
Pharming does not require the user to be tricked into clicking a link. Instead, pharming redirects victims from a legitimate site to a bogus website. To accomplish this, the attacker employs another attack, such as DNS cache poisoning. |
Credential harvesting
|
is a common goal of phishing campaigns that involves capturing usernames and passwords
|
watering hole attack
|
An attack in which the attacker focuses on a site frequently visited by the target. Similar to spear phishing but does not use email.
|
Typo Squatting
|
An attack that most commonly relies on typographic errors made by users on the Internet. Also
known as URL hijacking |
Why are Hoaxes interesting?
|
Hoaxes are interesting because although a hoax presents a threat.
|
Hoax
|
A situation that seems like it could be legitimate
but often results from people seeking to carry out various threats |
influence campaign
|
Coordinated actions that seek to affect the development, actions, and behavior of the targeted population.
|
Does recent influence campaing include hybrid warfare?
|
yes
|
Hybrid warfare
|
Hybrid warfare can and often does include a combination of these methods, but the psychological,
economic, and political influence aspects go beyond just distraction to achieving greater goals, such as dividing public opinion by exploiting societal vulnerabilities. |
PRINCIPLES OF INFLUENCE
(REASONS FOR EFFECTIVENESS) |
Authority.
Intimidation. Consensus/social proof. carcity and urgency. Familiarity/liking. Trust |
Authority.
|
Job titles, uniforms, symbols, badges, and even specific
expertise |