Manipulating individuals into divulging confidential or personal information that may be used for fraudulent purposes.
What is Social Engineering?
This should always be removed from computer/laptop when walking away. This item should be no more than an arms length away.
What is a CAC card or token?
Targets a specific person or group using deceptive messages or emails, disguised coming from a trusted source.
What is Spear Phishing?
This should not be left laying around on your desk. If you are not actively using it, it should be put away.
What is PII?
A phishing technique using phone calls to deceive the caller. The goal is to gain sensitive information.
Bonus 20pt: Give an example of a phishing technique (10 seconds)
What is Vishing?
This can be laying around, unmarked. Do NOT leave this unattended in a sipr cafe.
What is Unlabled Media?
Gaining physical access to a secure area by following someone with access.
Bonus 20pts: Give an example. (10 seconds)
What is Tailgating or Piggyback?
I can be opened or closed, but never left cracked. When closed, you should verify that I can't be opened again.
What are unsecured Doors?
Targeting high profile individuals, such as CEOs using personalized emails to transfer funds coming from trusted source to gain access to the company's sensitive information.
What is Whaling?
I love to eat paper. You should make sure I'm NSA approved or someone can put the pieces back together.
What is an unapproved shredder?