Social Engineering and Cybersecurity Notes - Quizlet
Social Engineering and Cybersecurity Notes - Quizlet
Upgrade now
Cybersecurity
Ashley_Allen864
Phishing Attacks
• Overview of Phishing
• Phishing is a prevalent form of social engineering aimed at deceiving individuals into
divulging personal information.
• Attackers often impersonate trusted entities like banks or service providers to trick
users into clicking malicious links.
• Phishing involves spoofing legitimate websites to gather sensitive data like login
credentials.
• Pretexting is commonly used to create false scenarios, prompting victims to disclose
information willingly.
• Types of Phishing Attacks
• Pharming involves redirecting users to fake websites by compromising DNS servers or
websites.
• Attackers exploit typosquatting to create URLs similar to legitimate sites for deceptive
purposes.
• Vishing, or voice phishing, occurs over phone calls where attackers manipulate caller
IDs to appear trustworthy.
• Smishing, or SMS phishing, involves using text messages to deceive recipients into
divulging personal information.
Defense Mechanisms
• Attackers excel at impersonation, using pretexts and false identities to deceive victims.
• Common impersonation scenarios involve fake calls from reputable organizations like
Microsoft or the US Treasury to extract money or information.
• Impersonators often leverage reconnaissance data to mimic higher-ranking individuals
or use technical jargon to appear legitimate.
• By eliciting information through friendly conversations or technical terms, attackers aim
to extract sensitive data like passwords or email addresses.
Dumpster Diving
• Attackers gather valuable information by sifting through discarded materials like trash.
• Dumpster diving poses a security risk as attackers can extract sensitive data from
improperly disposed documents.
• Securing garbage disposal practices is essential to prevent unauthorized access to
confidential information.
• Proper disposal methods and shredding sensitive documents can deter dumpster
diving attempts.
• Overview of Dumpster Diving
• Dumpster diving involves gathering personal information from discarded items like
monthly statements, business documents, and personal correspondence.
• In the United States, dumpsters are common receptacles for trash, providing easy
access to sensitive information.
• Legality varies by location, with some areas allowing access to discarded items unless
restricted by local laws.
• To prevent dumpster diving, secure garbage areas with locks, shred documents, or
incinerate sensitive information.
Shoulder Surfing
Hoaxes
• Hoax involving fake software updates: Attackers create deceptive software update
pages to trick users into downloading malware.
• Unsolicited messages and phishing attempts: Users should be cautious of messages
requesting personal information or offering too-good-to-be-true deals.
• Recommendation to verify sources: Cross-reference suspicious messages on reputable
websites like hoaxslayer.net and snopes.com.
• Importance of spam filters: Utilize spam filters to automatically detect and divert
potential hoaxes and scams.
Spam Management
• Overview of Spam
• Spam filters can block unwanted emails by identifying phishing attempts, like requests
for personal information.
• Implementing allowed lists ensures only trusted senders' emails are accepted,
requiring regular maintenance.
• Filters can detect non-compliant messages with RFCs, discarding those not meeting
email standards.
• Reverse DNS checks IP addresses to verify email sources, flagging suspicious
discrepancies.
• Tar pitting slows down email exchanges, frustrating spammers by delaying mass
sending.
• Recipient filtering prevents delivery to non-existent addresses, enhancing email
security.
• Incoming emails are filtered at the mail gateway before reaching internal servers.
• Gateway checks for specific characteristics to identify and eliminate spam.
• Strategies like reverse DNS and recipient filtering enhance email security measures.
• Tar pitting technique slows down spammers' email servers, deterring rapid mass emails.
Influence Campaigns
• Fake accounts are generated to spread manipulated content across various online
platforms.
• Influence campaigns aim to sway public opinion by amplifying messages through
multiple channels.
• Real users unknowingly share manipulated content, leading to mass media coverage.
• Military entities may utilize influence campaigns to alter perceptions and influence
policies.
• Cyber warfare leverages online platforms to influence elections and shape news
narratives.
• Internet facilitates global military influence, impacting international relations.
• Social media transforms traditional warfare tactics into cyber-based strategies.
• Tailgating
Reconnaissance
9 / 69
This product is enhanced by AI and may provide incorrect or problematic content. Please report any
content that needs review by clicking .