Identify the Attack
Psychological Tactics
Defensive Controls
Definitions
Random Throwbacks???
100

A text message informs you that a password change has been initiated and asks you to confirm this was you by replying with your credentials.

Smishing
100

An email says your account will be locked within 30 minutes unless you respond immediately.

Urgency / Fear

100

An attacker tricks an employee into giving up their password and can login to their account. 

Multi-factor authentication (MFA)

100

A targeted phishing attack against a user or group?

Spearphishing

100

The network of all interconnected devices capable of collecting, transmitting, or acting on data.

The Internet of Things (IoT)

200

A caller presents a believable backstory involving a routine business process and requests one small piece of information to “close the loop.”

Pretexting

200

A message claims to be from the CFO and asks for quick confirmation before a payment is sent.

Authority

200

An attacker sends multiple phishing emails using fear, urgency, and authority, taking advantage of users inability to recognize the phishing emails.   

Security awareness training

200

Manipulating people into performing actions or revealing information.

Social Engineering

200

A self replicating malware that spreads across networks on its own. 

Worms

300

Someone in business casual follows employees into a badge-protected area while talking on the phone.

Tailgating

300

A caller says, “Everyone else has already completed this — you’re the last one left.”

Social pressure / Conformity

300

An attacker pretends to be a manager and requests sensitive information, and the employee is unsure what to do next.

Clear security policies and processes

300

An attack where an attacker pretends to be a trusted individual such as IT staff, management, or a vendor.

Impersonation

300

Policy that allows users to use their personal devices for work. 

Bring-Your-Own-Devices (BYOD)
400

USB drives labeled “Q4 Bonuses” are left in the employee parking lot.

Baiting

400

A contractor you’ve worked with for months asks you to “just send the file like usual” since they’re locked out today.

Trust / Familiarity

400

Employees frequently plug unknown USB drives into their work computers.

USB device control / endpoint protection policies

400

A targeted phishing attack against a high level executive (c-suite).

Whaling

400

7 Domains of IT

User, Workstation, LAN, LAN-WAN, WAN, Remote Access, System/Application

500

An attacker emails first, then later shows up in person referencing the email conversation.

Hybrid social engineering attack

500

An email with the subject line “Updated Salary Adjustments – See Attached” is sent to multiple employees without further explanation.

Curiosity

500

An employee suspects a social engineering attempt but does not report it, allowing the attack to continue elsewhere.

Method of reporting

500

An unauthorized person enters a restricted area with the help or permission of an authorized person. 

Piggybacking


500

5 Phases of an Attack

Reconnaissance, Gaining Access, Maintaining Access, Clearing Tracks, Exploitation

M
e
n
u