Terminology
Attack Types and Differences¶
Phishing vs Vishing vs Whaling vs Smishing¶
Vishing -> voice phising
Whaling -> phising high-profile
Smishing -> SMS phising
Spam & Spim¶
spim -> spam over instant messaging
Shoulder surfing¶
Dumpster diving¶
Tailgating¶
Shoulder surfing¶
source: https://octopus-office.co.uk/shoulder-surfing-how-to-avoid-it/
Zero Day¶
Social Engineering¶
Reconnaissance¶
Impersonation¶
Watering hole attack¶
target -> website X
attacker -> website X (accessed by target)
Drive by attack¶
exploit user web browser or its plugins
Typo Squatting¶
bca.com
-> bc4.com
Bruteforce & Password spraying¶
Bruteforce
Pspraying
Term¶
Antivirus¶
Antimalware¶
Malware can include various types of threats, such as viruses, worms, Trojans, spyware, adware, and ransomware.
EDR¶
Endpoint Detection and Response (EDR), computer, laptop, phone, IoT, etc that connected to network.
- Monitoring
- Detection
- Investigation
- Remediation
DLP¶
Data Loss Prevention