Show Menu
Cheatography

Awareness Module 4 Cheat Sheet (DRAFT) by

This cheat sheet summarizes the key concepts from Module 4 to help with quiz preparation.

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Types of Social Engine­ering

Phishing
Emails that contain malicious links or attach­ments that will attempt to compromise systems and/or creden­tials.
Vishing
Phone call or voicemail where the threat actor attempts to socially engineer a victim to perform certain tasks.
Smishing
Text messages that ask victims to click a link, open an attach­ment, or call a number.
Tailgating
Following someone into an unauth­orized area by pretending to have proper author­ization or by acting to be in a hurry.
Piggyb­acking
Entering a restricted area with an authorized person through deception or unawar­eness of the authorized person.
Impers­onation
Pretending to be an authorized person to gain access to a restricted area.
Eavesd­ropping
Listening in on conver­sations to try to acquire sensitive inform­ation.
Shoulder surfing
Looking over someone’s “shoul­der,” in their personal work area, to observe inform­ation like creden­tials or other sensitive inform­ation.
Dumpster diving
Searching trash for sensitive inform­ation that has been discarded.
Physical theft
Stealing physical devices, media, or documents to gain access to sensitive inform­ation.

Cyber Concerns for MFA

Phishing
SIM Swapping
Device Cloning
Service Compro­mising
MFA User Fatigue
MFA isn't foolproof. Skilled attackers use social engine­ering to target employees, steal creden­tials, and launch MFA fatigue attacks.

Cybers­ecurity Concerns of BYOD

System and data Security
Legal and compliance
Mixing of personal and profes­sional life
Device compat­ibility
Old Software
Lack of security controls
 

Defense Against Physical Social Engine­ering

Piggyb­acking & Tailgating:
1) Do not allow entry to restricted areas without proper author­iza­tion.
2) Politely challenge those trying to enter using your access.
3) Do not accept excuses for missing creden­tials.

Shoulder Surfing:
1) Use a privacy filter on screens.
2) Keep desks clear of sensitive documents.
3) Restrict access with badge-­con­trolled areas.

Dumpster Diving:
1) Shred unneeded documents.
2) Securely destroy computers and physical media.
3) Ensure trash and recycling bins are secure.

Physical Theft:
1) Encrypt hard drives, USBs, and storage devices.
2) Lock away devices and documents when unatte­nded.
3) Never leave devices unsupe­rvised.

Impers­onation:
1) Always validate identi­ties.
2) Be prepared to ask questions to confirm authen­ticity.

Eavesd­ropping:
1) Stay aware of your surrou­ndings.
2) Discuss sensitive data in secure locations.
3) Use headphones for virtual meetings.

Virtual Private Network (VPN)

A VPN encrypts internet connec­tions for secure data transm­ission, preventing unauth­orized access. Organi­zations use VPNs for safe remote access, even on untrusted networks like public Wi-Fi.

Benefits of VPNs

Encryption and Privacy
VPNs encrypt connec­tions to protect data, creating a secure tunnel for safe sending and receiving of data.
Access to restricted content
VPNs allow employees to securely access an organi­zat­ion’s network remotely from approved locations.
Protection against cyber threats
VPNs encrypt data to prevent eavesd­ropping and block cyber threats.