CH2: Malware and Social Engineering
Attacks
Malware
Circulation / Infection
Concealment
Payload capabilities
Viruses
Worms
Trojan
Root Kit
Collect Data
Delete Data
Modify System Security
Launch Attacks
botnet
logic bomb
backdoor
Ransomware
Adware
Spyware
Social Engineering Attacks
Psychological Approaches
Physical Procedures
Impersonation
Phishing
Spam
Hoaxes
Typo Squatting
Watering Hole Attack
Dumpster Diving
Tailgating