From af334b4f5efac439f02a38ca77c6945673819cb6 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Sun, 24 Jul 2022 13:58:15 +1200 Subject: [PATCH] vault backup: 2022-07-24 13:58:15 --- ...threats-social-engineering-and-failures.md | 20 ++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/content/notes/03-threats-social-engineering-and-failures.md b/content/notes/03-threats-social-engineering-and-failures.md index 76bb131d7..33d50b6c9 100644 --- a/content/notes/03-threats-social-engineering-and-failures.md +++ b/content/notes/03-threats-social-engineering-and-failures.md @@ -138,4 +138,22 @@ information overload technique Reciprocation - technique that exploits our tendency to return a favour -- even if first \ No newline at end of file +- even if first favour was not requested +- even if the return favour is more valuable +- double disagreement + - if the attacker created a double disagreement and gives in one, the victim will have the tendency to ive in the other +- expectation + - if the victim is requested to give the first favour, they will believe that the attacker becomes a future ally + +tendency to obey authority +- milgram experiement + +dont be a commitment creep +- people have a tendency to follow commitments even when is might be unwise + +information exortion is the practive of requesting a ransom for your valuable information +- ransomware + +# Attacks +represent intentional or unintentional acts that can damage or compromise assets +- \ No newline at end of file