Created by
Terms in this set (13)
Social engineering is an attack against a user, and typically involves some form of social interaction. The weakness that is being exploited in the attack is not necessarily one of technical knowledge, or even security awareness. Social engineering at its heart involves manipulating the very social nature of interpersonal relationships.
The best defense against social engineering attacks is a comprehensive training and awareness program that includes social engineering. The training should emphasize the value of being helpful and working as a team, but doing so in an environment where trust is verified and is a ritual without social stigma.
Shoulder surfing does not necessarily involve direct contact with the target but instead involves the attacker directly observing the individual entering sensitive information on a form, keypad, or keyboard. The attacker may simply look over the shoulder of the user at work or may set up a camera or use binoculars to view the user entering sensitive data.
The process of going through a target's trash in hopes of finding valuable information that might be used in a penetration attempt is known in the security community as dumpster diving.
- Through this, an attacker might gather a variety of information that can be useful in a social engineering attack. IN MOST LOCATIONS, TRASH IS NO LONGER CONSIDERED PRIVATE PROPERTY AFTER IT HAS BEEN DISCARDED.
- An organization should have policies about discarding materials. Sensitive information should be shredded and trash should be secured.
- Through this, an attacker might gather a variety of information that can be useful in a social engineering attack. IN MOST LOCATIONS, TRASH IS NO LONGER CONSIDERED PRIVATE PROPERTY AFTER IT HAS BEEN DISCARDED.
- An organization should have policies about discarding materials. Sensitive information should be shredded and trash should be secured.
- Using previously obtained information about a project, deadlines, bosses, and so on, the attacker arrives with 1) something the victim is quasi-expecting or would see as normal, 2) uses the guise of a project in trouble or some other situation where the attacker will be viewed as helpful or as one not to upset, and 3) they name-drop "Mr. Big," who happens to be out of the office and unreachable at the moment, avoiding the reference check. And the attacker seldom asks for anything that on the face of it seems unreasonable, or is unlikely to be shared based on the circumstances.
Students also viewed
Recent flashcard sets
Sets found in the same folder
Other sets by this creator
Verified questions
Recommended textbook solutions

Operations Management: Sustainability and Supply Chain Management
12th Edition•ISBN: 9780134163451 (4 more)Barry Render, Chuck Munson, Jay Heizer1,698 solutions

Operations Management: Sustainability and Supply Chain Management
12th Edition•ISBN: 9780134165325Barry Render, Chuck Munson, Jay Heizer1,698 solutions

Information Technology Project Management: Providing Measurable Organizational Value
5th Edition•ISBN: 9781118898208Jack T. Marchewka346 solutions

Other Quizlet sets
1/7