Compare and Contrast type of attacks Social Engineering Phishing, Spear Phishing , Whaling, Vishing, Tailgating, Impersonation, Dumpster Diving, Shoulder Surfing Application/Service Attacks Buffer Overflow, Injection, Cross-Site Scripting, Cross-Site Forgery, Privilege Escalation, Impersonation/Masquerading, Replay, Driver Manipulation (Shimming, Refactoring) Cryptographic Attacks Birthday, Known plain text/cipher text, Rainbow Tables, Dictionary, Brute Force, Pass the hash Hijacking and… Continue reading Types of Cyber Attacks