Definition: The process by which intruders gain access to facilities, network, systems, data and even employees by exploiting the generally trusting nature of people. The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. Reference: Chris Hadnagy, The Art of Human Hacking (Wiley, 2010) Social… Continue reading Social Engineering
Tag: Phishing
Types of Cyber Attacks
Compare and Contrast type of attacks Social Engineering Phishing, Spear Phishing , Whaling, Vishing, Tailgating, Impersonation, Dumpster Diving, Shoulder Surfing Application/Service Attacks Buffer Overflow, Injection, Cross-Site Scripting, Cross-Site Forgery, Privilege Escalation, Impersonation/Masquerading, Replay, Driver Manipulation (Shimming, Refactoring) Cryptographic Attacks Birthday, Known plain text/cipher text, Rainbow Tables, Dictionary, Brute Force, Pass the hash Hijacking and… Continue reading Types of Cyber Attacks