Phishing - Phishing: Fraudulent emails or messages trick users into sharing sensitive information (e.g., passwords, credit card numbers)., Vishing - Vishing: Voice phishing where attackers use phone calls to deceive individuals into revealing confidential data., Shoulder Surfing - Shoulder Surfing: Observing someone’s screen or keyboard to steal sensitive information, such as passwords., Whaling - Whaling: Targeted phishing aimed at high-profile individuals like executives, often involving customized and convincing messages., Tailgating - Tailgating: Gaining unauthorized access to restricted areas by following authorized personnel., Impersonation - Impersonation: Pretending to be someone else, such as an IT support staff, to gain trust and access., Dumpster Diving - Dumpster Diving: Retrieving sensitive information by sifting through discarded documents or electronic devices., Evil Twin - Evil Twin: Setting up a fake Wi-Fi hotspot to intercept sensitive information from unsuspecting users., Distributed Denial of Service (DDoS) - Distributed Denial of Service (DDoS): Overwhelms systems with traffic from multiple sources, rendering services unavailable., Denial of Service (DoS) - Denial of Service (DoS): Similar to DDoS but originates from a single source., Zero-Day Attack - Zero-Day Attack: Exploits unknown or unpatched vulnerabilities in software or systems., Spoofing - Spoofing: Masquerading as a trusted entity to deceive users or systems., On-Path Attack (formerly Man-in-the-Middle) - On-Path Attack. Intercepts and potentially alters communications between two parties., Brute-Force Attack - Brute-Force Attack: Repeatedly guesses passwords until the correct one is found., Dictionary Attack - Dictionary Attack: Uses a list of common passwords or words to guess user credentials., Insider Threat. - Insider Threat: Malicious actions by trusted individuals, such as employees or contractors, with access to sensitive systems., Structured Query Language (SQL) Injection - Structured Query Language (SQL) Injection: Exploits vulnerabilities in web applications to manipulate databases and extract data., Cross-Site Scripting (XSS) - Cross-Site Scripting (XSS): Injects malicious scripts into web pages, potentially stealing data or redirecting users., Non-Compliant Systems - Non-Compliant Systems: Systems not adhering to security policies or standards, increasing risk exposure., Unpatched Systems - Unpatched Systems: Systems with missing updates or security patches, leaving them vulnerable to exploits., Unprotected Systems: - Unprotected Systems: Systems lacking antivirus software, firewalls, or other security controls., End-of-Life (EOL - End-of-Life (EOL) Operating Systems: Unsupported OSs no longer receive security updates, making them prime targets., Bring Your Own Device (BYOD) - Bring Your Own Device (BYOD): Personal devices accessing organizational networks may lack necessary security controls, creating potential entry points.,
0%
a+1102 2.4 Explain common social-engineering attacks, threats, and vulnerabilities
Dela
av
Thedrizzzle86
Higher Education
Computing
information technology
Redigera innehåll
Bädda in
Mer
Uppdrag
Rankningslista
Visa mer
Visa mindre
Denna topplista är för närvarande privat. Klicka på
dela
för att göra den offentlig.
Denna topplista har inaktiverats av resursägaren.
Denna topplista är inaktiverad eftersom att alternativen är olika för resursägarna.
Återgå alternativ
Matcha upp
är en öppen mall. Det genererar inte noter för en poänglista.
Inloggning krävs
Visuell stil
Teckensnitt
Prenumeration krävs
Alternativ
Växla mall
Visa alla
Flera format visas när du spelar aktiviteten.
Öppna resultat
Kopiera länk
QR-kod
Ta bort
Återställ sparas automatiskt:
?