Please enable JavaScript.
Coggle requires JavaScript to display documents.
3.6 fundamentals of cyber security (social engineering (balgging (using an…
3.6 fundamentals of cyber security
penetration tests
white box
is to simulate a malicious insider who has knowledge of and possibly basic credentials (authentication) for the target system
unrealistic as they already have insite/ info - not in the position of a uninformed attacker
black box
is to stimulate an external hacking or cyber warfare attack.
authorised tests to evaluate security of an infrastructure by safely hacking into system
social engineering
balgging
using an invented scenario manipulate a targeted victim into revealing information
phising
fraudulently obtaining
private information, often using email or SMS.
shouldering
observing a person's private information over their shoulder
pharming
a cyber-attack intended to redirect
a website's traffic to another, fake site.
the art of manipulating people into giving up information
Malicious software - Malware
trojan
malware masquerading as having a legitimate purpose for being installed.
you let it pas your firewall
usually spread via email
spyware
a software that gathers information about user without their knowledge.
will track and store users movements: identity, email, passwords,
adware
will allow a company to record websites that you visit and present similar advertisements
advertisements
detecting and preventing Malware
captcha
authentication
email verification
password
Biometric data
automatic software up dates