Save
Social Engineering
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Simon Noveski
Visit profile
Subdecks (5)
Password Attacks
Social Engineering
10 cards
Cryptographic Attacks
Social Engineering
2 cards
Wireless attacks
Social Engineering
9 cards
Technical Attacks
Social Engineering
29 cards
Phishing
Social Engineering
5 cards
Cards (62)
Social Engineering
is an attack against a user that involves some form of
social interaction
Social Engineering
is
effective
because it preys on people's basic desire to be
helpful
and their desire to avoid
confrontations
Types of social engineering attacks include:
Phishing
Tailgating
Impersonation
Third-party Authorization
Help Desk/Tech Support
Contractors/Outside Parties
Online attacks
Dumpster diving
Shoulder surfing
Hoax
Waterhole attack
Dumpster Diving
:
Act of going through
trash
to find
valuable
information that might be used in a
penetration
attempt
Shoulder surfing
:
Attacker attempts to
observe
individuals entering
sensitive information
, such as on a form,
keyboard
, or
keypad
, without
direct
interaction
Hoax:
Common on
social media sites
Usually involves a
recommendation
to make a
change
that
weakens security
Often
advises users
to share the "issue,"
spreading the hoax
further
Watering Hole Attacks
:
First identified by
RSA
Involves
infecting
a
website
with
malware
Users unknowingly
download malware
to their system when visiting the infected site
Attackers
plant malware
at
frequently
visited sites, similar to
predators
waiting for
prey
near a
watering hole
See all 62 cards