threats & solutions

11williamsonl
Mind Map by , created over 5 years ago

ME

19
0
0
Tags
11williamsonl
Created by 11williamsonl over 5 years ago
CUltural Mind Map
Mark Kelly
Quarter 2 Book Prodject
Mackenzie Norvil
Ratios Quiz
rory.examtime
To Kill A Mockingbird Complete Notes
jessica.moscrip
El Buen Vivir y Convivir
Erika Daniela Ro
Uses of Limestone.
greenchloe1998
Myalgic Encyphalomyelitis
Joanna Rogowska
My attempt on making family tree
Suze Kwakman
Self Study
lbrundidge
threats & solutions
1 Social engineering
1.1 : This means gaining access by persuading people to hand over passwords or security-related information unwittingly and then using that information to access the system
2 DIRECT ATTACK
2.1 These may involve exploiting a server vulnerability to gain access and / or attacking password hashes with dictionary or brute-force methods to reveal passwords which give access to the system
3 Phishing
3.1 • This is a technique where official-looking emails are sent out to millions of users in an attempt to fool them into clicking a link and entering personal information. This information is then used for identity theft or to hack into other systems. Because so many emails can be sent out at no cost, it only takes a small percentage of people to fall for the trick for it to be successful.
3.2 Spear-phishing
3.2.1 • Spear-phishing is similar but it specifically targets the user, often including information which is already known about them and pretending to be from an individual or organisation whom they already know. This increases the chances that the user will believe it is from a legitimate source

Media attachments