Phishing - Phishing: Fraudulent emails or messages trick users into sharing sensitive information (e.g., passwords, credit card numbers)., Vishing - Vishing: Voice phishing where attackers use phone calls to deceive individuals into revealing confidential data., Shoulder Surfing - Shoulder Surfing: Observing someone’s screen or keyboard to steal sensitive information, such as passwords., Whaling - Whaling: Targeted phishing aimed at high-profile individuals like executives, often involving customized and convincing messages., Tailgating - Tailgating: Gaining unauthorized access to restricted areas by following authorized personnel., Impersonation - Impersonation: Pretending to be someone else, such as an IT support staff, to gain trust and access., Dumpster Diving - Dumpster Diving: Retrieving sensitive information by sifting through discarded documents or electronic devices., Evil Twin - Evil Twin: Setting up a fake Wi-Fi hotspot to intercept sensitive information from unsuspecting users., Distributed Denial of Service (DDoS) - Distributed Denial of Service (DDoS): Overwhelms systems with traffic from multiple sources, rendering services unavailable., Denial of Service (DoS) - Denial of Service (DoS): Similar to DDoS but originates from a single source., Zero-Day Attack - Zero-Day Attack: Exploits unknown or unpatched vulnerabilities in software or systems., Spoofing - Spoofing: Masquerading as a trusted entity to deceive users or systems., On-Path Attack (formerly Man-in-the-Middle) - On-Path Attack. Intercepts and potentially alters communications between two parties., Brute-Force Attack - Brute-Force Attack: Repeatedly guesses passwords until the correct one is found., Dictionary Attack - Dictionary Attack: Uses a list of common passwords or words to guess user credentials., Insider Threat. - Insider Threat: Malicious actions by trusted individuals, such as employees or contractors, with access to sensitive systems., Structured Query Language (SQL) Injection - Structured Query Language (SQL) Injection: Exploits vulnerabilities in web applications to manipulate databases and extract data., Cross-Site Scripting (XSS) - Cross-Site Scripting (XSS): Injects malicious scripts into web pages, potentially stealing data or redirecting users., Non-Compliant Systems - Non-Compliant Systems: Systems not adhering to security policies or standards, increasing risk exposure., Unpatched Systems - Unpatched Systems: Systems with missing updates or security patches, leaving them vulnerable to exploits., Unprotected Systems: - Unprotected Systems: Systems lacking antivirus software, firewalls, or other security controls., End-of-Life (EOL - End-of-Life (EOL) Operating Systems: Unsupported OSs no longer receive security updates, making them prime targets., Bring Your Own Device (BYOD) - Bring Your Own Device (BYOD): Personal devices accessing organizational networks may lack necessary security controls, creating potential entry points.,
0%
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
Deli
ustvaril/-a
Thedrizzzle86
Higher Education
Computing
information technology
Uredi vsebino
Vdelaj
Več
Naloge
Lestvica vodilnih
Prikaži več
Prikaži manj
Ta lestvica je trenutno zasebna. Kliknite
Deli
, da jo objavite.
Lastnik vira je onemogočil to lestvico vodilnih.
Ta lestvica vodilnih je onemogočena, ker se vaše možnosti razlikujejo od možnosti lastnika vira.
Možnosti za vrnitev
Ujemanje
je odprta predloga. Ne ustvarja rezultatov za lestvico vodilnih.
Potrebna je prijava
Vizualni slog
Pisave
Zahtevana je naročnina
Možnosti
Preklopi predlogo
Pokaži vse
Med igranjem dejavnosti se bo prikazalo več oblik zapisa.
Odprti rezultati
Kopiraj povezavo
QR koda
Izbriši
Obnovi samodejno shranjeno:
?