Phishing - Phishing: Fraudulent emails or messages trick users into sharing sensitive information (e.g., passwords, credit card numbers)., Vishing - Vishing: Voice phishing where attackers use phone calls to deceive individuals into revealing confidential data., Shoulder Surfing - Shoulder Surfing: Observing someone’s screen or keyboard to steal sensitive information, such as passwords., Whaling - Whaling: Targeted phishing aimed at high-profile individuals like executives, often involving customized and convincing messages., Tailgating - Tailgating: Gaining unauthorized access to restricted areas by following authorized personnel., Impersonation - Impersonation: Pretending to be someone else, such as an IT support staff, to gain trust and access., Dumpster Diving - Dumpster Diving: Retrieving sensitive information by sifting through discarded documents or electronic devices., Evil Twin - Evil Twin: Setting up a fake Wi-Fi hotspot to intercept sensitive information from unsuspecting users., Distributed Denial of Service (DDoS) - Distributed Denial of Service (DDoS): Overwhelms systems with traffic from multiple sources, rendering services unavailable., Denial of Service (DoS) - Denial of Service (DoS): Similar to DDoS but originates from a single source., Zero-Day Attack - Zero-Day Attack: Exploits unknown or unpatched vulnerabilities in software or systems., Spoofing - Spoofing: Masquerading as a trusted entity to deceive users or systems., On-Path Attack (formerly Man-in-the-Middle) - On-Path Attack. Intercepts and potentially alters communications between two parties., Brute-Force Attack - Brute-Force Attack: Repeatedly guesses passwords until the correct one is found., Dictionary Attack - Dictionary Attack: Uses a list of common passwords or words to guess user credentials., Insider Threat. - Insider Threat: Malicious actions by trusted individuals, such as employees or contractors, with access to sensitive systems., Structured Query Language (SQL) Injection - Structured Query Language (SQL) Injection: Exploits vulnerabilities in web applications to manipulate databases and extract data., Cross-Site Scripting (XSS) - Cross-Site Scripting (XSS): Injects malicious scripts into web pages, potentially stealing data or redirecting users., Non-Compliant Systems - Non-Compliant Systems: Systems not adhering to security policies or standards, increasing risk exposure., Unpatched Systems - Unpatched Systems: Systems with missing updates or security patches, leaving them vulnerable to exploits., Unprotected Systems: - Unprotected Systems: Systems lacking antivirus software, firewalls, or other security controls., End-of-Life (EOL - End-of-Life (EOL) Operating Systems: Unsupported OSs no longer receive security updates, making them prime targets., Bring Your Own Device (BYOD) - Bring Your Own Device (BYOD): Personal devices accessing organizational networks may lack necessary security controls, creating potential entry points.,
0%
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
共享
由
Thedrizzzle86
Higher Education
Computing
information technology
编辑内容
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?