Q: What is Social Engineering? A: Manipulating individuals into divulging confidential information for malicious purposes. Q: Name common targets of social engineering attacks. A: Receptionists, Help-Desk Personnel, Technical Support Executives, System Administrators, Users and Clients, Vendors, Senior Executives. Q: List the impacts of social engineering on organizations. A: Economic Losses, Damage to Goodwill, Loss of Privacy, Terrorism Risks, Lawsuits and Arbitration, Business Closure. Q: What behaviors make individuals vulnerable to social engineering? A: Authority, Intimidation, Consensus or Social Proof, Scarcity and Urgency, Familiarity or Liking, Trust, Greed. Q: What factors make companies vulnerable to social engineering? A: Insufficient Security Training, Unregulated Access to Information, Multiple Organizational Units, Lack of Security Policies. Q: Why is social engineering effective? A: Preys on human psychology, Cheap and easy to implement, Difficult to detect, No specific tools to fully safeguard. Q: Describe the phases of a social engineering attack. A: Research the Target, Select a Target, Develop a Relationship, Exploit the Relationship. Q: Name human-based social engineering techniques. A: Impersonation, Vishing (Voice Phishing), Eavesdropping, Shoulder Surfing, Dumpster Diving, Baiting. Q: Name computer-based social engineering techniques. A: Phishing, Spam Mail, Instant Messaging, Scareware. Q: Name mobile-based social engineering techniques. A: Publishing Malicious Apps, Repackaging Legitimate Apps, Fake Security Applications, SMiShing (SMS Phishing). https://quizlet.com/au/928576377/module-9-social-engineering-flash-cards/?i=2hfw1u&x=1qqt