Social Engineering Techniques


Types of Attacks


Human Factors in Security

Common Social Engineering Scams
Mitigation Strategies

100

What is "baiting"?

Baiting is a tactic where an attacker offers something enticing to lure victims into a trap, often using a USB drive left in a public place.

100

What is "phishing"?

Phishing is a cyber attack that uses fake emails or websites to trick individuals into providing personal or confidential information.

100

What is the human factor in cybersecurity?

The human factor refers to the vulnerabilities that arise from human behavior and decision-making, which can lead to security breaches.

100

What is a "Nigerian Prince" scam?

This scam involves receiving an email from someone claiming to be a Nigerian prince who needs help transferring money, promising a large reward for assistance.

100

How can users mitigate social engineering risks?

 Users can mitigate risks by being aware of social engineering tactics, questioning suspicious requests, and verifying identities.

200

"Shoulder Surfing" is …

Shoulder surfing is a technique where an attacker watches someone enter sensitive information, such as passwords, by looking over their shoulder.

200

Explain "spear phishing."

 Spear phishing is a targeted version of phishing where attackers customize their attacks to a specific individual or organization.

200

Why do humans make security mistakes?

Humans may make mistakes due to lack of awareness, complacency, or being manipulated by attackers exploiting social engineering tactics.

200

What is a "Tech Support" scam.

In this scam, attackers impersonate tech support from a legitimate company, claiming the victim's computer is infected and offering to fix it for a fee.

200

What is a "clean desk policy"?

A clean desk policy requires employees to keep their workspaces tidy and to secure sensitive information when not in use.

300

What is "piggybacking" in security?

Piggybacking occurs when an unauthorized person follows an authorized individual into a restricted area, often by taking advantage of the trust established by the authorized person.

300

 What is "whaling"?

Whaling is a type of phishing attack that targets high-profile individuals, such as executives, to steal sensitive information.

300

What is "dumpster diving."

Dumpster diving is a tactic where attackers search through trash to find discarded documents that may contain sensitive information.

300

What is a "Lottery Scam"?

This scam informs victims they have won a lottery or prize but must pay a fee or provide personal information to claim it.

300

Why is user training so important?

User training is essential for educating employees about cybersecurity threats and best practices to prevent social engineering attacks.

400

What is "vishing."

Vishing, or voice phishing, is a social engineering tactic where attackers use phone calls to trick individuals into revealing sensitive information.

400

What is "smishing."

Smishing is the use of SMS text messages to conduct phishing attacks, tricking users into revealing personal information.

400

What is the role of "authority" in social engineering?

Attackers often exploit perceived authority to manipulate victims into complying with requests they would normally reject.

400

Explain "Romance Scam."

 In romance scams, attackers build a relationship with victims online, often using fake profiles, to gain their trust and eventually ask for money or personal information.

400

What are procedures in cybersecurity?

Procedures are step-by-step instructions that guide users in implementing security policies effectively.

500

What are "scareware" tactics?

Scareware tactics involve tricking users into believing their system is infected with malware, prompting them to purchase fake security software.

500

What is "pretexting"?

 Pretexting involves creating a fabricated scenario to trick individuals into divulging confidential information.


500

How can "urgency" be exploited?

Attackers create a sense of urgency to pressure individuals into making quick decisions, often leading to security breaches.

500

What is an "Online Auction Scam"?

This scam involves fraudulent listings on auction sites where the seller takes payment for an item that either doesn't exist or is not as described.

500

How do policies guide security measures?

Policies establish the framework for security practices, outlining expectations and responsibilities for all employees to protect sensitive information.