• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
What is:

Shoulder Surfing
A form of social engineering, it involves watching someone "over their

shoulder" when they enter sensitive data.
What is:

Dumpster Diving
A common physical access method , it involves looking for sensitive material

that was thrown out.
What is:

Tailgating
A favorite method of gaining entry to a locked area by following someone through

the door they just unlocked.
What is:

Impersonation
A method of social engineering that involves any act of pretending to be

someone you are not.
What are:

Hoaxes
A phony threat, a humorous or malicious deception.
What is:

Whaling
A type of social engineering that is no more than phishing or spear phishing for big

users.
What are:

The 7 Principles Behind Social Engineering
Authority

Intimidation

Consensus/Social Proof

Scarcity

Urgency

Familiarity/Liking

Trust
What is a:

Deterrent Control
Anything intended to warn a would–be attacker that they should not attack.

This could be a posted warning notice, locks on doors, barricades, lighting, or anything that can

delay or discourage an attack.
What is a:

Preventive Control
A control that stops something from happening such as locked doors, user

training on potential harm, or even biometric devices and guards that can deny access.
What is

a:

Detective Control
A control that is used to uncover a violation such as an alarm, a file

checksum, or antivirus.
What is a:

Compensating Control
Backup controls that come into play only when other controls have

failed such as an alarm that sounds when a door is jimmied or a backup generator.
What is a:

Technical Control
Controls that are implemented through technology, such as IDS, IPS,

firewalls, etc.
What is a:

Administrative Control
A control that comes down through policies, procedures, and guidelines

such as an escalation procedure to be used in the event of a break–in (who to notify first, etc).