Methodes Of Attack Flashcards
Malware
A software designed to harm device or network
Virus
A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data
Example of: Malware
Worm
Malware that self replicates, spreading across the network and infecting computers
Example of: Malware
Ransomware
A malicious attack during which threat actors encrypt an organisations data and demand payment to restore access
Example of: Malware
Spyware
Malicious software installed on a users computer without their permission, which is used to spy on and steel user data
Example of: Malware
Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software.
Spear Phishing
A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source
Example of: Phishing
Whaling
A form of a spear phishing during which threat actors target executors in order to gain access to sensitive data
Example of: Phishing
Business email compromise
BEC an attack in which a threat actor impersonate a known source to obtain a financial advantage
Example of: Phishing
Vishing
The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source
Example of: phishing
Social engineering
Manipulation technique that exploits human error to gain unauthorised access to sensitive, private, and/or valuable data
Social media phishing
An attack in which threat actor collects detailed information about their target on social media sites before initiating an attack
Example of: social engineering
Watering hole attack
An attack in which a threat actor compromises a website frequently visited by a specific group of users
Example of: social engineering
Physical social engineering
An attack in which threat actor impersonate an employee, customer, or vendor to obtain unauthorised access to a physical location
Example of: social engineering
USB baiting
An attack in which a threat actor strategically leaves a Malware USB stick for an employee to find and unknowingly infected network
Example of: social engineer