CH2: Malware and Social Engineering
Attacks

Malware

Circulation / Infection

Concealment

Payload capabilities

Viruses

Worms

Trojan

Root Kit

Collect Data

Delete Data

Modify System Security

Launch Attacks

botnet

logic bomb

backdoor

Ransomware

Adware

Spyware

Social Engineering Attacks

Psychological Approaches

Physical Procedures

Impersonation

Phishing

Spam

Hoaxes

Typo Squatting

Watering Hole Attack

Dumpster Diving

Tailgating