Hackers gain access to their targets in a variety of ways. The below list of entry point methods are common techniques that cybercriminals use to prey on our human behaviors and gain access to sensitive information or networks.
- Phishing: Attempting to acquire sensitive information, such as usernames and passwords (otherwise known as user credentials), credit card details, and banking information by masquerading as a trustworthy entity. There are several types of phishing. Some of the most commonly used methods are email phishing, phishing via phone (called vishing), phishing via text message or SMS (smishing), and targeted phishing directed at a person with a high level of access (spear phishing).
- Malware: Tricking users into downloading malicious software (malware) intended to access, damage, or control a device or network — and often delivered via a link or attachment in a phishing email.
- Social Engineering: Manipulating people into taking action or revealing confidential information.
- Exploiting Public Information: Using information that is publicly available on the internet (for example, a social media platform) to help design a social engineering attack, crack a password, or create a targeted phishing email.
- Tailgating: Gaining access to a secured area, either by following a legitimate badge holder in or by persuading someone to let them in.
- Eavesdropping: Secretly listening in on private conversations.
- Dumpster Diving: Collecting sensitive information from the recycling or trash that was not appropriately destroyed.
- Installing Rogue Devices: Gaining access to a secure network by installing a wireless router or USB thumb drive containing malicious software.
0 Comments