Security+ SY0-601: 1.1 Social Engineering Techniques

This entry is part 5 of 47 in the series [ Security+ SY0-601 ]

Chapter 1: Social Engineering Techniques

Social engineering is one of the most common attacks, and the most devastating. You’ll need to know not just what it is, but the correct terms for types of attacks.

Social Engineering – tricking a person into allowing access to a system; this includes dumpster diving and phishing

Social Engineering Attacks

Phishing

Info
You and your clients can submit, verify and track phishing attempts on the PhishTank web site:
http://phishtank.org/index.php

 

Spear phishing

Whaling

Smishing

Vishing

Spam

SPIM

Dumpster diving

Shoulder surfing

Pharming

Tailgating

Prepending

Identity fraud

Invoice scams

Credential harvesting

Reconnaissance

Hoax

Impersonation

Third-party authorization

Contractors/outside parties

Online attacks

Watering hole attacks

Typosquatting

Pretexting

Influence campaigns

Principles: Why Social Engineering Works

Authority

Intimidation

Consensus

Scarcity

Familiarity

Trust
http://www.infosecisland.com/blogview/17011-Broken-Trust-Part-2-Applying-the-Approach-to-Dropbox.html

Urgency

Defenses

Processes (protocols)

Training

Series Navigation<< Security+ SY0-601: 1.0 Threats, Attacks, and VulnerabilitiesSecurity+ SY0-601: 1.2 Indicators of Attack >>