74 - Attack Vectors - Phishing

Attack Vectors

  • Various types of Phishing
  • Impersonation
  • Physical Attacks
  • Cognitive-type Attacks

Cyber Hygiene

Measures taken to keep sensitive data safe and secure

Virtual Machine

Program that creates a virtual environment that emulates the behaviour of an actual machine but is isolated and secure

Sandbox

Execution of programs in an isolated part of the operating system to ensure safety

Phishing

Phishing is Internet Fraud in which the the attacker tricks the victim into compromising themselves or an organization