2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet608/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   604   605   606   607   608   609   610   611   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Spear Phishing
Spear phishing
is a form of phishing targeted to a specifi c group of users, such as employees 
within a specifi c organization. It may appear to originate from a colleague or co-worker 
within the organization or from an external source. 
For example, attackers exploited a zero-day vulnerability in Adobe PDF fi les that 
allowed them to embed malicious code. If users opened the fi le, it installed malware onto 
the user’s systems. The attackers named the PDF fi le something like Contract Guide and 
stated in the email that it provided updated information on a contract award process. They 
sent the email to targeted email addresses at well-known government contractors such as 
Lockheed Martin. If any contractors opened the fi le, it installed malware on their systems 
that gave attackers remote access to infected systems. 


Understanding Access Control Attacks 
651
A zero-day vulnerability is one that application vendors either don’t know 
about or have not released a patch to remove the vulnerability. The Adobe 
PDF attack exploited a vulnerability in PDF files. Even though Adobe 
patched that vulnerability, attackers discover new application vulnerabili-
ties regularly.
Whaling
Whaling
is a variant of phishing that targets senior or high-level executives such as chief 
executive offi cers (CEOs) and presidents within a company. A well-known whaling attack 
targeted about 20,000 senior corporate executives with an email identifying each recipient 
by name and stating they were subpoenaed to appear before a grand jury. It included a link 
to get more information on the subpoena. If the executive clicked the link, a message on the 
website indicated that the executive needed to install a browser add-on to read the fi le. 
Executives that approved the installation of the add-on installed malicious software 
that logged their keystrokes, capturing login credentials for different websites they visited. 
It also gave the attacker remote access to the executive’s system, allowing the attacker to 
install additional malware, or read all the data on the system.
Vishing 
While attackers primarily launch phishing attacks via email, they have also used other 
means to trick users, such as instant messaging (IM) and VoIP. 
Vishing
is a variant of phishing that uses the phone system or VoIP. A common attack 
uses an automated call to the user explaining a problem with a credit card account. The 
user is encouraged to verify or validate information such as a credit card number, expira-
tion date, and security code on the back of the card. Vishing attacks commonly spoof the 
caller ID number to impersonate a valid bank or fi nancial institution.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   604   605   606   607   608   609   610   611   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish