3.6 fundamentals of cyber security (social engineering (balgging (using…
3.6 fundamentals of cyber security
is to simulate a malicious insider who has knowledge of and possibly basic credentials (authentication) for the target system
unrealistic as they already have insite/ info - not in the position of a uninformed attacker
is to stimulate an external hacking or cyber warfare attack.
authorised tests to evaluate security of an infrastructure by safely hacking into system
using an invented scenario manipulate a targeted victim into revealing information
private information, often using email or SMS.
observing a person's private information over their shoulder
a cyber-attack intended to redirect
a website's traffic to another, fake site.
the art of manipulating people into giving up information
Malicious software - Malware
malware masquerading as having a legitimate purpose for being installed.
you let it pas your firewall
usually spread via email
a software that gathers information about user without their knowledge.
will track and store users movements: identity, email, passwords,
will allow a company to record websites that you visit and present similar advertisements
detecting and preventing Malware
automatic software up dates