Understanding the primary modus operandi of cyberattackers is crucial to being able to detect a probable breach attempt and get your guard up.
Thwart these attempts before they sabotage your data and systems.
2. @infosectrain
01
Baiting is a method of social
engineering attack where malicious
actors make false promises to
customers to entice them to expose
personal details or install malware
on their system.
Baiting
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
3. @infosectrain
02
Pretexting is a social engineering
attack that creates made-up
scenarios to trick victims to reveal
sensitive information.
Pretexting
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
4. @infosectrain
03
Phishing is the most common type
of social engineering attack that
employs email as its primary
transmission medium, where
scammers send many emails or
texts simultaneously, hoping to get
even a few responses.
Phishing
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
5. @infosectrain
04
Scareware refers to social
engineering attacks that use fear
to compel victims into doing
something against their sense of
right and wrong.
Scareware
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
6. @infosectrain
05
Spear Phishing attackers target
specific individuals. The entire
procedure of this attack requires
significant time to correctly estimate
the target’s behavioral tendencies,
personal attributes, and general
contacts.
Spear Phishing
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
7. @infosectrain
06
Tailgating is a method of attack
that involves bypassing any security
checks and entering systems
without permission by following
someone else.
Tailgating
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com
8. @infosectrain
07
A honeytrap attack is meant to
catch people looking for love on
social media or online dating
sites.
Honeytrap
#
l
e
a
r
n
t
o
r
i
s
e
www.infosectrain.com