Phishing - Phishing: Fraudulent emails or messages trick users into sharing sensitive information (e.g., passwords, credit card numbers)., Vishing - Vishing: Voice phishing where attackers use phone calls to deceive individuals into revealing confidential data., Shoulder Surfing - Shoulder Surfing: Observing someone’s screen or keyboard to steal sensitive information, such as passwords., Whaling - Whaling: Targeted phishing aimed at high-profile individuals like executives, often involving customized and convincing messages., Tailgating - Tailgating: Gaining unauthorized access to restricted areas by following authorized personnel., Impersonation - Impersonation: Pretending to be someone else, such as an IT support staff, to gain trust and access., Dumpster Diving - Dumpster Diving: Retrieving sensitive information by sifting through discarded documents or electronic devices., Evil Twin - Evil Twin: Setting up a fake Wi-Fi hotspot to intercept sensitive information from unsuspecting users., Distributed Denial of Service (DDoS) - Distributed Denial of Service (DDoS): Overwhelms systems with traffic from multiple sources, rendering services unavailable., Denial of Service (DoS) - Denial of Service (DoS): Similar to DDoS but originates from a single source., Zero-Day Attack - Zero-Day Attack: Exploits unknown or unpatched vulnerabilities in software or systems., Spoofing - Spoofing: Masquerading as a trusted entity to deceive users or systems., On-Path Attack (formerly Man-in-the-Middle) - On-Path Attack. Intercepts and potentially alters communications between two parties., Brute-Force Attack - Brute-Force Attack: Repeatedly guesses passwords until the correct one is found., Dictionary Attack - Dictionary Attack: Uses a list of common passwords or words to guess user credentials., Insider Threat. - Insider Threat: Malicious actions by trusted individuals, such as employees or contractors, with access to sensitive systems., Structured Query Language (SQL) Injection - Structured Query Language (SQL) Injection: Exploits vulnerabilities in web applications to manipulate databases and extract data., Cross-Site Scripting (XSS) - Cross-Site Scripting (XSS): Injects malicious scripts into web pages, potentially stealing data or redirecting users., Non-Compliant Systems - Non-Compliant Systems: Systems not adhering to security policies or standards, increasing risk exposure., Unpatched Systems - Unpatched Systems: Systems with missing updates or security patches, leaving them vulnerable to exploits., Unprotected Systems: - Unprotected Systems: Systems lacking antivirus software, firewalls, or other security controls., End-of-Life (EOL - End-of-Life (EOL) Operating Systems: Unsupported OSs no longer receive security updates, making them prime targets., Bring Your Own Device (BYOD) - Bring Your Own Device (BYOD): Personal devices accessing organizational networks may lack necessary security controls, creating potential entry points.,
0%
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
공유
만든이
Thedrizzzle86
Higher Education
Computing
information technology
콘텐츠 편집
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?