Identify: Methods of attack

 Worm

Definition

Malware that self-replicates, spreading across the network and infecting computers

Example of: Malware


Ransomware

Definition

A malicious attack during which threat actors encrypt an organization's data and demand payment to restore access

Example of: Malware


Spyware

Definition

Malicious software installed on a user’s computer without their permission, which is used to spy on and steal user data

Example of: Malware


Phishing

Definition

The use of digital communications to trick people into revealing sensitive data or deploying malicious software


Spear phishing

Definition

A malicious email attack targeting a specific user or group of users that appears to originate from a trusted source

Example of: Phishing


Whaling

Definition

A form of spear phishing during which threat actors target executives in order to gain access to sensitive data

Example of: Phishing


Business email compromise (BEC)

Definition

An attack in which a threat actor impersonates a known source to obtain a financial advantage

Example of: Phishing


Vishing

Definition

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

Example of: Phishing


Social engineering

Definition

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data


Social media phishing

Definition

An attack in which a threat actor collects detailed information about their target on social media sites before initiating an attack

Example of: Social engineering


Watering hole attack

Definition

An attack in which a threat actor compromises a website frequently visited by a specific group of users

Example of: Social engineering


Physical social engineering

Definition

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

Example of: Social engineering


USB baiting

Definition

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network

Example of: Social engineering


Malware

Definition

A software designed to harm devices or networks


Virus

Definition

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

Example of: Malware






Comments

Popular posts from this blog

Common cybersecurity terminology

Introduction to security frameworks and controls

syllabus