Social Engineering
Attack types
Principles
Defense
Scenarios
100

What is social engineering?

Manipulating people to give confidential information.

100

What attack uses fake emails?

Phishing

100

What is least privilege?

Giving minimum access necessary to complete their task.

100

Multiple conditions or attributes must be checked and verified before access is granted. 

Separation of duties (MFA+identiy+training)

100

Email asking for password is what attack?

Phishing

200

What is the link humans are considered?

Weakest

200

Free USB attack type?

Baiting

200

Split task among people are what?

Separation of duties 

200

Multiple security layers is called?

Defense-in-Depth

200

Fake IT support scam?

Quid pro quo

300

Fake identity attack?

Pretexting

300

System defaults secure?

Fail-safe

300

Keep systems simple?

Economy of mechaniism

300

Check every access request?

Complete mediation

300

Why avoiding clicking unknown links is very helpul?

Prevent malware and phishing

400

Which human traits are exploited and cause people to commit crimes?

Emotions

400

Attackers promises rewards or free times if you click on a link or open attachements.

Baiting

400

Ways to protect your yourself from social engineering when you are not sure of the person.

Ask for identification or credentials or ID card

400

Defense mechanisms are layed to protect system with multiple barriers against any attack. 

Defense of Depth

400

When leveraging existing components what has to be introduced first.

Exisiting components and maximum numbert of existing components must be leveraged and reused.

500

Name the (4) phases of social engineering.

Investigation, Infiltration, exploitation and exit

500

Humans are part of the security chain, so are firewalls but when attacked the firewall response will be.

NO!

500

Protecting yourself and devices from social engineering you must take this step. 

Keep software and applications up-to-date.

500

Fail secure = fail safe keeping all assests safe example ATM true or false.

True

500

Attack is complete, target is achieved, attackers cover their track and close the interaction without raising any suspension what phase of social engineering. 

Phase of Exit