Social Engineering - A strategy that relies on humans trusting nature , Tailgating - when an unauthorized person tries to sneak in behind someone as the enter a secured area, Vishing - Trying to gain someone's trust can access the secured data via the phone or voice channel , Spear Phising - a targeted phishing attack where you are trying to fool a specific target for there access to data and resources, pharming - a passive means of redirecting users from a legitimate website, water hole attack - Users visit an infected website and their systems become infected simply by visiting that website, Credential Harvesting - a campaign specifically designed to steal account credentials., Dumpster Diving - Digging through a target's trash , Authority - entice the target to act in a particular manner or risk adverse consequences, Whaling - targets are a “high-value” people such as CEOs and CFOs, Hoax - Victims are tricked into doing something harmful that they think is NOT harmful, Malware - Catch-all term for any malicious software, Virus - one type of malware that spreads without authorization, Worm - self-propagating, replicates itself over the network via methods such as file sharing, print sharing, and instant, PUP - Potentially unwanted program, ROOTKITS - The most challenging types of malware because they are specially designed to maintain persistence and root-level access on a system without being detected, LOGIC BOMB - deliberately installed usually by an authorized user, this malicious code sits dormant until a pre-programmed date then it delivers its malicious payload, Crypto-malware - encrypts system files so that these files are no longer usable, Ransomware - Files are encrypted and the affected user must pay a ransom before the attacker (potentially) provides a decryption key, MALWARE INDICATORS - Antivirus Notifications, Resource Consumption, File System notification, and a system not performing as usual ,
0%
Find the match Security+SY0-601 day 2
Partager
par
Chrisfreeman
Modifier le contenu
Incorporer
Plus
Affectations
Classement
Afficher plus
Afficher moins
Ce classement est actuellement privé. Cliquez sur
Partager
pour le rendre public.
Ce classement a été désactivé par le propriétaire de la ressource.
Ce classement est désactivé car vos options sont différentes pour le propriétaire de la ressource.
Rétablir les Options
Trouver la correspondance
est un modèle à composition non limitée. Il ne génère pas de points pour un classement.
Connexion requise
Style visuel
Polices
Abonnement requis
Options
Changer de modèle
Afficher tout
D'autres formats apparaîtront au fur et à mesure que vous jouerez l'activité.
Ouvrir les résultats
Copier le lien
Code QR
Supprimer
Restauration auto-sauvegardé :
?