unauthorized access - occurs when a person accesses resources without permission, dumpster diving - searching through the trash looking for information, shoulder surfing - observing someone’s screen or keyboard to get information, social engineering - using or manipulating people inside the organization to gain access to its network or facilities, infiltration - a type of social engineering attack, impersonation - entering a building physically disguised as cleaning personnel, repair techs, etc, tailgating - following someone through the door, telephone scam - most common type of social engineering attack, phishing - attempting to obtain usernames and passwords typically through email, denial of service - uses various methods to overwhelm a system, malware - any program or code designed to do something undesirable on a system or network,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?