Phishing - Phishing: Fraudulent emails or messages trick users into sharing sensitive information (e.g., passwords, credit card numbers)., Vishing - Vishing: Voice phishing where attackers use phone calls to deceive individuals into revealing confidential data., Shoulder Surfing - Shoulder Surfing: Observing someone’s screen or keyboard to steal sensitive information, such as passwords., Whaling - Whaling: Targeted phishing aimed at high-profile individuals like executives, often involving customized and convincing messages., Tailgating - Tailgating: Gaining unauthorized access to restricted areas by following authorized personnel., Impersonation - Impersonation: Pretending to be someone else, such as an IT support staff, to gain trust and access., Dumpster Diving - Dumpster Diving: Retrieving sensitive information by sifting through discarded documents or electronic devices., Evil Twin - Evil Twin: Setting up a fake Wi-Fi hotspot to intercept sensitive information from unsuspecting users., Distributed Denial of Service (DDoS) - Distributed Denial of Service (DDoS): Overwhelms systems with traffic from multiple sources, rendering services unavailable., Denial of Service (DoS) - Denial of Service (DoS): Similar to DDoS but originates from a single source., Zero-Day Attack - Zero-Day Attack: Exploits unknown or unpatched vulnerabilities in software or systems., Spoofing - Spoofing: Masquerading as a trusted entity to deceive users or systems., On-Path Attack (formerly Man-in-the-Middle) - On-Path Attack. Intercepts and potentially alters communications between two parties., Brute-Force Attack - Brute-Force Attack: Repeatedly guesses passwords until the correct one is found., Dictionary Attack - Dictionary Attack: Uses a list of common passwords or words to guess user credentials., Insider Threat. - Insider Threat: Malicious actions by trusted individuals, such as employees or contractors, with access to sensitive systems., Structured Query Language (SQL) Injection - Structured Query Language (SQL) Injection: Exploits vulnerabilities in web applications to manipulate databases and extract data., Cross-Site Scripting (XSS) - Cross-Site Scripting (XSS): Injects malicious scripts into web pages, potentially stealing data or redirecting users., Non-Compliant Systems - Non-Compliant Systems: Systems not adhering to security policies or standards, increasing risk exposure., Unpatched Systems - Unpatched Systems: Systems with missing updates or security patches, leaving them vulnerable to exploits., Unprotected Systems: - Unprotected Systems: Systems lacking antivirus software, firewalls, or other security controls., End-of-Life (EOL - End-of-Life (EOL) Operating Systems: Unsupported OSs no longer receive security updates, making them prime targets., Bring Your Own Device (BYOD) - Bring Your Own Device (BYOD): Personal devices accessing organizational networks may lack necessary security controls, creating potential entry points.,
0%
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
Delen
door
Thedrizzzle86
Higher Education
Computing
information technology
Inhoud Bewerken
Embedden
Meer
Toewijzingen
Scorebord
Meer weergeven
Minder weergeven
Dit scoreboard is momenteel privé. Klik op
Delen
om het publiek te maken.
Dit scoreboard is uitgeschakeld door de eigenaar.
Dit scoreboard is uitgeschakeld omdat uw opties anders zijn dan die van de eigenaar.
Opties Herstellen
Verbinden
is een open template. Het genereert geen scores voor een scoreboard.
Inloggen vereist
Visuele stijl
Lettertypen
Abonnement vereist
Opties
Template wisselen
Alles weergeven
Er zullen meer templates verschijnen terwijl je de activiteit gebruikt.
Open resultaten
Kopieer link
QR-code
Verwijderen
Automatisch opgeslagen activiteit "
" herstellen?