The step when you use a combination of tools and techniques to create a full profile of an organization and its security posture.
Recon/Foot Printing
When you find discarded papers that might contain confidential information.
Dumpster Diving
The cause of the majority of security breaches. (67% or more)
Phishing
The meaning of the acronym OSINT
Open-Source Intelligence Tools
To minimize the risk of something taking place.
Mitigate
The step when you use the security posture of the device to enter into a system.
Gaining Access
When you get into a restricted space by following another person.
Piggybacking
One of the first and most prolific scams.
Nigerian Prince Letter
The 3 criteria required to count as OSINT
Free, Public, Legal
The desired behavior for a user in a company.
Policy
The step when you increase your capabilities with that device.
Escalating Privileges
When you offer something of value like a prize if you click a link or leave a USB drive to be found.
Baiting
Attack on a specific type of target.
Spear Phishing
These are sent to the targets after OSINT information is gathered.
Phishing Emails
The steps users are expected to follow in order to adhere to the policies in place.
Procedure
The step when you modify the logs to hide your access.
Covering Tracks
Pretexting
Attack when the user is tricked into downloading malware on their smartphone or device.
Smishing
True/False: Google classroom is an example of an OSINT source.
False
This is the final step in establishing a policy.
Formal Training
This is the final step when you make it so you can get back into the system.
Installing Backdoors
Wearing a "uniform" to gain access.
Pretextion
A type of identity fraud that uses phone calls or voicemails to trick people into sharing sensitive information
Vishing
True/False: Accessing information from a data breach posted online is an example of OSINT.
True
This is the biggest threat to manage in cybersecurity.
Humans