Social Engineering - A strategy that relies on humans trusting nature , Tailgating - when an unauthorized person tries to sneak in behind someone as the enter a secured area, Vishing - Trying to gain someone's trust can access the secured data via the phone or voice channel , Spear Phising - a targeted phishing attack where you are trying to fool a specific target for there access to data and resources, pharming - a passive means of redirecting users from a legitimate website, water hole attack - Users visit an infected website and their systems become infected simply by visiting that website, Credential Harvesting - a campaign specifically designed to steal account credentials., Dumpster Diving - Digging through a target's trash , Authority - entice the target to act in a particular manner or risk adverse consequences, Whaling - targets are a “high-value” people such as CEOs and CFOs, Hoax - Victims are tricked into doing something harmful that they think is NOT harmful, Malware - Catch-all term for any malicious software, Virus - one type of malware that spreads without authorization, Worm - self-propagating, replicates itself over the network via methods such as file sharing, print sharing, and instant, PUP - Potentially unwanted program, ROOTKITS - The most challenging types of malware because they are specially designed to maintain persistence and root-level access on a system without being detected, LOGIC BOMB - deliberately installed usually by an authorized user, this malicious code sits dormant until a pre-programmed date then it delivers its malicious payload, Crypto-malware - encrypts system files so that these files are no longer usable, Ransomware - Files are encrypted and the affected user must pay a ransom before the attacker (potentially) provides a decryption key, MALWARE INDICATORS - Antivirus Notifications, Resource Consumption, File System notification, and a system not performing as usual ,
0%
Find the match Security+SY0-601 day 2
Udostępnij
autor:
Chrisfreeman
Edytuj elementy
Osadź
Więcej
Tabela rankingowa
Pokaż więcej
Pokaż mniej
Ta tabela rankingowa jest obecnie prywatna. Kliknij przycisk
Udostępnij
, aby ją upublicznić.
Ta tabela rankingowa została wyłączona przez właściciela materiału.
Ta tabela rankingowa została wyłączona, ponieważ Twoje opcje różnią się od opcji właściciela materiału.
Przywróć poprzednie opcje
Znajdź parę
jest szablonem otwartym. Nie generuje wyników w tabeli rankingowej.
Wymagane logowanie
Motyw
Czcionki
Wymagany abonament
Opcje
Zmień szablon
Pokaż wszystko
Więcej formatów pojawi się podczas wykonywania ćwiczenia.
Otwórz wyniki
Kopiuj link
Kod QR
Usuń
Przywrócić automatycznie zapisane ćwiczenie:
?