Social Engineering
CIA Triad
AAA
Threat Actors
Attack Vectors
100

This attack tricks a user with a fake email or message that appears to come from a trusted source.

What is phishing?

100

If student medical records are stolen from a school database, this part of the CIA triad has been violated.

What is confidentiality?

100

In a phishing attack, when the attacker steals a victim’s password, the AAA function they are trying to defeat first is this one.

What is authentication?

100

A person who already has authorized access to a system, such as an employee or contractor, fits this threat-actor type.

What is an internal threat actor or insider threat?

100

Leaving infected USB drives in a parking lot or lobby in hopes someone plugs one in is this kind of lure-based attack.

What is a USB drop attack?

200

This social engineering method uses a believable made-up story to persuade the victim to reveal information or take an unsafe action.

What is pretexting?

200

If an attacker changes website content to spread false information, this part of the CIA triad is affected.

What is integrity?

200

If a user is allowed to open only files for their own department after logging in, that is this AAA function.

What is authorization?

200

A threat actor who uses cyberattacks to support a political or ideological cause is called this.

What is a hacktivist?

200

A device left with its factory-set admin password exposed this common network weakness.

What are default credentials?

300

This attack type uses SMS text messages to send fake links or urgent account warnings.

What is smishing?

300

If ransomware locks a college’s systems so staff and students cannot log in, this part of the CIA triad is damaged.

What is availability?

300

When a business email compromise attack succeeds because an executive’s real mailbox was already taken over, the attacker has likely bypassed this AAA function.

What is authentication?

300

This type of advanced threat actor often has strong funding, skilled teams, and long-term strategic goals tied to a government.

What is a nation-state actor?

300

A fake website reached through a misspelled domain like exannple.com is an example of this attack method.

What is typosquatting?

400

This type of spear phishing targets high-level executives or other powerful decision-makers inside an organization.

What is whaling?

400

A pharming attack that silently redirects users to a fake banking site is most likely trying to compromise this CIA objective first by stealing login credentials.

What is confidentiality?

400

If security logs show which employee account accessed a sensitive system during an insider attack, those logs support this AAA function.

What is accounting?

400

These threat actors are usually motivated by profit and commonly pursue fraud, blackmail, extortion, and data theft.

What is organized crime?

400

In the 2013 Target breach, attackers used a trusted vendor relationship as the way in. This broad attack area is called the ______ attack surface.

What is the supply chain attack surface?

500

In this attack, the attacker compromises a website the target group already trusts and visits, then waits for victims to come to it.

What is a watering hole attack?

500

An attacker secretly changes payroll data without authorization, even though the system stays online and no files are stolen. This part of the CIA triad is most directly affected.

What is integrity?

500

After logging in, a staff member can access student records but cannot open payroll files. This AAA function decides what they are allowed to access.

What is authorization?

500

This term describes an adversary that gains access and stays inside a network over time using multiple tools and techniques.

What is an advanced persistent threat (APT)?

500

An attacker sends a fake login email to steal a users password. This is an example of this specific attack vector.

What is phishing?