Professional Documents
Culture Documents
By Soumedhik Naskar
By Soumedhik Naskar
Soumedhik
Naskar
Introduction
Social engineering represents a catch-all term for various tactics that are used by
hackers. These tactics are designed to trick individuals into giving out sensitive or
confidential information.
Ransomware
The hallmark of these attacks is coordination. A cyber attacker floods the system with a hi
number of simultaneous functions, such as a request to a webpage.
Maintaining Access:
Clearing Track:
Types of Scanning
Port Scanning
Network Scanning
Gaining Access
Password Attacks
Social Engineering
Viruses
Maintaining Access
Trojans
Os backdoors
Clears Tracks
Information security controls
1.Confidentiality
3.Availability
Availability' means ensuring timely and reliable access
to and use of information.