Social Engineering - A strategy that relies on humans trusting nature , Tailgating - when an unauthorized person tries to sneak in behind someone as the enter a secured area, Vishing - Trying to gain someone's trust can access the secured data via the phone or voice channel , Spear Phising - a targeted phishing attack where you are trying to fool a specific target for there access to data and resources, pharming - a passive means of redirecting users from a legitimate website, water hole attack - Users visit an infected website and their systems become infected simply by visiting that website, Credential Harvesting - a campaign specifically designed to steal account credentials., Dumpster Diving - Digging through a target's trash , Authority - entice the target to act in a particular manner or risk adverse consequences, Whaling - targets are a “high-value” people such as CEOs and CFOs, Hoax - Victims are tricked into doing something harmful that they think is NOT harmful, Malware - Catch-all term for any malicious software, Virus - one type of malware that spreads without authorization, Worm - self-propagating, replicates itself over the network via methods such as file sharing, print sharing, and instant, PUP - Potentially unwanted program, ROOTKITS - The most challenging types of malware because they are specially designed to maintain persistence and root-level access on a system without being detected, LOGIC BOMB - deliberately installed usually by an authorized user, this malicious code sits dormant until a pre-programmed date then it delivers its malicious payload, Crypto-malware - encrypts system files so that these files are no longer usable, Ransomware - Files are encrypted and the affected user must pay a ransom before the attacker (potentially) provides a decryption key, MALWARE INDICATORS - Antivirus Notifications, Resource Consumption, File System notification, and a system not performing as usual ,
0%
Find the match Security+SY0-601 day 2
Teilen
von
Chrisfreeman
Inhalt bearbeiten
Einbetten
Mehr
Bestenliste
Mehr anzeigen
Weniger anzeigen
Diese Bestenliste ist derzeit privat. Klicke auf
Teilen
um sie öffentlich zu machen.
Diese Bestenliste wurde vom Eigentümer der Ressource deaktiviert.
Diese Bestenliste ist deaktiviert, da sich Ihre Einstellungen von denen des Eigentümer der Ressource unterscheiden.
Einstellungen zurücksetzen
Die passende Antwort
ist eine Vorlage mit offenem Ende. Es generiert keine Punkte für eine Bestenliste.
Anmelden erforderlich
Visueller Stil
Schriftarten
Abonnement erforderlich
Einstellungen
Vorlage ändern
Alle anzeigen
Weitere Formate werden angezeigt, wenn du die Aktivität spielst.
Offene Ergebnisse
Link kopieren
QR-Code
Löschen
Soll die automatisch gespeicherte Aktivität
wiederhergestellt werden?