Social Engineering - A strategy that relies on humans trusting nature , Tailgating - when an unauthorized person tries to sneak in behind someone as the enter a secured area, Vishing - Trying to gain someone's trust can access the secured data via the phone or voice channel , Spear Phising - a targeted phishing attack where you are trying to fool a specific target for there access to data and resources, pharming - a passive means of redirecting users from a legitimate website, water hole attack - Users visit an infected website and their systems become infected simply by visiting that website, Credential Harvesting - a campaign specifically designed to steal account credentials., Dumpster Diving - Digging through a target's trash , Authority - entice the target to act in a particular manner or risk adverse consequences, Whaling - targets are a “high-value” people such as CEOs and CFOs, Hoax - Victims are tricked into doing something harmful that they think is NOT harmful, Malware - Catch-all term for any malicious software, Virus - one type of malware that spreads without authorization, Worm - self-propagating, replicates itself over the network via methods such as file sharing, print sharing, and instant, PUP - Potentially unwanted program, ROOTKITS - The most challenging types of malware because they are specially designed to maintain persistence and root-level access on a system without being detected, LOGIC BOMB - deliberately installed usually by an authorized user, this malicious code sits dormant until a pre-programmed date then it delivers its malicious payload, Crypto-malware - encrypts system files so that these files are no longer usable, Ransomware - Files are encrypted and the affected user must pay a ransom before the attacker (potentially) provides a decryption key, MALWARE INDICATORS - Antivirus Notifications, Resource Consumption, File System notification, and a system not performing as usual ,
0%
Find the match Security+SY0-601 day 2
Kopīgot
autors:
Chrisfreeman
Rediģēt saturu
Drukāt
Iegult
Vairāk
Uzdevumus
Līderu saraksts
Rādīt vairāk
Rādīt mazāk
Šī līderu grupa pašlaik ir privāta. Noklikšķiniet uz
Kopīgot
, lai to publiskotu.
Mācību līdzekļa īpašnieks ir atspējojis šo līderu grupu.
Šī līderu grupa ir atspējota, jo jūsu izmantotās iespējas atšķiras no mācību līdzekļa īpašnieka iespējām.
Atjaunot sākotnējās iespējas
Atrast saderības
ir atvērta veidne. Tā neģenerē rezultātus līderu grupai.
Nepieciešams pieteikties
Vizuālais stils
Fonts
Nepieciešams abonements
Iespējas
Pārslēgt veidni
Rādīt visus
Atskaņojot aktivitāti, tiks parādīti vairāki formāti.
Atvērtie rezultāti
Kopēt saiti
QR kods
Dzēst
Atjaunot automātiski saglabāto:
?