Podcast
Questions and Answers
What is the primary difference between fishing and targeted attacks?
What is the primary difference between fishing and targeted attacks?
What do cyber criminals use to create a credible story and build false trust in pretexting?
What do cyber criminals use to create a credible story and build false trust in pretexting?
What is the goal of a quid pro quo social engineering method?
What is the goal of a quid pro quo social engineering method?
What is the primary risk associated with social media usage?
What is the primary risk associated with social media usage?
Signup and view all the answers
What is the ultimate goal of an attacker in a targeted attack?
What is the ultimate goal of an attacker in a targeted attack?
Signup and view all the answers
What is the purpose of the attacker offering a gift card in the example of a targeted attack?
What is the purpose of the attacker offering a gift card in the example of a targeted attack?
Signup and view all the answers
Study Notes
Types of Cyber Attacks
- Cyber criminals use two types of attacks: fishing and targeted attacks (also known as spear fishing)
- Fishing attacks are opportunistic, while targeted attacks are personalized and appear legitimate
- Targeted attacks are more likely to be successful due to their high level of personalization
Social Media Risks
- Cyber criminals extract personal information from social media accounts
- Seemingly innocuous posts can be used as weapons against individuals
Social Engineering Methods
- Pretexting: using gathered information to create a credible story and build false trust
- Quid pro quo: offering something in exchange for something else to reduce resistance to requests
Example of a Targeted Attack
- An attacker sends an email to a victim, referencing a recent achievement (e.g. winning a "best place to work" award)
- The attacker builds trust by asking about the victim's work and offering a gift card in exchange for help
- The victim clicks on an attachment, giving the attacker access to their computer and organizational information
Types of Cyber Attacks
- Cyber criminals use two types of attacks: fishing and targeted attacks (also known as spear fishing)
- Fishing attacks are opportunistic, casting a wide net to see who bites
- Targeted attacks are personalized and appear legitimate, making them more likely to be successful
Social Media Risks
- Cyber criminals extract personal information from social media accounts
- Seemingly innocuous posts can be used as weapons against individuals
- Social media profiles can provide attackers with valuable information to build targeted attacks
Social Engineering Methods
- Pretexting: using gathered information to create a credible story and build false trust
- Quid pro quo: offering something in exchange for something else to reduce resistance to requests
Example of a Targeted Attack
- Attackers use public information to build a personalized attack
- Attackers build trust by referencing a recent achievement or event
- Attackers offer something of value (e.g. gift card) in exchange for help or information
- The goal of a targeted attack is to gain access to a victim's computer and organizational information
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the different types of cyber attacks, including fishing and targeted attacks, as well as the risks associated with social media and cybersecurity threats.