Podcast
Questions and Answers
What is tailgating in the context of office security?
What is tailgating in the context of office security?
What is the main motivation for someone to engage in tailgating?
What is the main motivation for someone to engage in tailgating?
How does Johnny Long demonstrate tailgating in his book, No Tech Hacking?
How does Johnny Long demonstrate tailgating in his book, No Tech Hacking?
What is a common tactic used by individuals engaging in tailgating at the office?
What is a common tactic used by individuals engaging in tailgating at the office?
Signup and view all the answers
How do some individuals exploit the kindness of others to gain entry through a secure door?
How do some individuals exploit the kindness of others to gain entry through a secure door?
Signup and view all the answers
Why is preventing tailgating important in an office environment?
Why is preventing tailgating important in an office environment?
Signup and view all the answers
What is the purpose of a visitor badge in most organizations?
What is the purpose of a visitor badge in most organizations?
Signup and view all the answers
What does the sign 'no tailgating, or one scan, one person' near a locked door signify?
What does the sign 'no tailgating, or one scan, one person' near a locked door signify?
Signup and view all the answers
What is a common tactic used in an invoice scam?
What is a common tactic used in an invoice scam?
Signup and view all the answers
Why might an accounting department pay a fake invoice without proper verification?
Why might an accounting department pay a fake invoice without proper verification?
Signup and view all the answers
What is a credential harvesting attack focused on acquiring?
What is a credential harvesting attack focused on acquiring?
Signup and view all the answers
How might an attacker execute a credential harvesting attack through email?
How might an attacker execute a credential harvesting attack through email?
Signup and view all the answers
Why is it crucial for users to have antivirus and anti-malware software?
Why is it crucial for users to have antivirus and anti-malware software?
Signup and view all the answers
What is the main goal of someone engaging in tailgating in an office environment?
What is the main goal of someone engaging in tailgating in an office environment?
Signup and view all the answers
How might a person using tailgating blend in to gain unauthorized access?
How might a person using tailgating blend in to gain unauthorized access?
Signup and view all the answers
What social engineering aspect is associated with tailgating?
What social engineering aspect is associated with tailgating?
Signup and view all the answers
In Johnny Long's book, how does he demonstrate gaining access through tailgating?
In Johnny Long's book, how does he demonstrate gaining access through tailgating?
Signup and view all the answers
What is a common ruse used by individuals engaging in tailgating to gain entry?
What is a common ruse used by individuals engaging in tailgating to gain entry?
Signup and view all the answers
What tactic might an individual use while tailgating to ensure someone holds the door open for them?
What tactic might an individual use while tailgating to ensure someone holds the door open for them?
Signup and view all the answers
What is a common tactic used in a credential harvesting attack?
What is a common tactic used in a credential harvesting attack?
Signup and view all the answers
What is the primary purpose of a visitor badge in most organizations?
What is the primary purpose of a visitor badge in most organizations?
Signup and view all the answers
How might an attacker gain access to usernames and passwords through a credential harvesting attack?
How might an attacker gain access to usernames and passwords through a credential harvesting attack?
Signup and view all the answers
What is the danger of an attacker successfully executing a credential harvesting attack?
What is the danger of an attacker successfully executing a credential harvesting attack?
Signup and view all the answers
Why do some attackers prefer sending a scam invoice with a spoofed address?
Why do some attackers prefer sending a scam invoice with a spoofed address?
Signup and view all the answers
How does an attacker often attempt to trick users into executing a script that extracts credentials?
How does an attacker often attempt to trick users into executing a script that extracts credentials?
Signup and view all the answers
What is the significance of organizations having policies related to visitor badges?
What is the significance of organizations having policies related to visitor badges?
Signup and view all the answers
How does clicking on a link in a scam invoice email benefit an attacker?
How does clicking on a link in a scam invoice email benefit an attacker?
Signup and view all the answers
What is the purpose of signs like 'no tailgating, or one scan, one person' near locked doors?
What is the purpose of signs like 'no tailgating, or one scan, one person' near locked doors?
Signup and view all the answers
What is the potential consequence of an accounting department paying a fraudulent invoice without proper verification?
What is the potential consequence of an accounting department paying a fraudulent invoice without proper verification?
Signup and view all the answers