Phishing Attack

Home/Tag:Phishing Attack

Penetration Testing

2020-09-24T10:36:23+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

A penetration test (pen test or pentest and or ethical hacking) is a simulated cyber-attack against a computer system to check for exploitable vulnerabilities. You should not be confused it with a vulnerability assessment. Source: en.wikipedia.org In fact, this test simulates a real-world attack to determine how any defenses will fare and the possible magnitude [...]

Social Engineering Attacks

2020-10-01T09:12:31+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , |

Social engineering attacks are more prevalent than most people think. The reason for their prevalence is that they are relatively easy to implement. Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. People are weakest link in the security chain, and in recent years hackers have be [...]

Information Security Concepts

2020-09-23T13:54:03+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , |

This post provides some information on the concept of security, the concept of security in the network, the concept of security threats and their types.     Security Risk  A computer security risk is the potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. In other [...]

Phishing Attacks

2020-09-23T13:48:29+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , |

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. There is another definition for this attack. We can say Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, [...]

Legal & Regulatory Issues

2020-07-16T05:43:32+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Legal & Regulatory Issues Today, one of the important aspects of cyber security is legal & regulatory issues. The following list of issues, may have legal or regulatory implications and lead to civil or criminal liability on the part of an organization. Cyber Crime Criminal activities committed over communication networks, such as the Internet, Telephone, [...]

Go to Top