18 April 2013 – 7:07 pm

Cyber security professionals should have an in depth understanding of the following types of cyber security threats. These are commonly called “anti-phishing”, “secure mail”, “secure email” or “web application firewall” (WAF). Some other terminology that may be helpful in understanding the difference between these threats are:

Email: how secure is yours? [Survey] – Naked Security

Phishing

A Type of Email Security Threat A successful phishing attack can often lead to the loss of email accounts and sensitive information such as passwords, bank account numbers, or social security numbers. Phishing emails are found by most consumers when they receive unsolicited emails. However, phishing emails can also be sent in person, by SMS, or by text message.
Phishing attacks are successful scams that are generated to fool people into giving up information such as passwords, personal data or credit card information. Phishing emails contain malicious code that could deceive the recipient into giving out their credentials to a scammer.
Failed phishing attempts cause users to view a fake site that tries to trick them into providing their credentials in order to gain access to their email account, social media or other systems. These hackers will then attempt to access your social media and email accounts and potentially siphon off your identity.

 

Insight
Insight is when a business or individual compromises the security of an online account to gain access to personal and sensitive information. A hacker can gain unauthorized access to an online account by registering as a new user on a social networking website. They can then log in to the account of an existing user or target an existing account and redirect them to an untrustworthy URL.
Enterprise or social media networks frequently use these techniques to scam people into revealing personal or financial data, such as a financial account number or personal identification number. In the early stages of a phishing attack, an email can appear to come from an organization or someone trusted to access their account. While the original sender does not actually have any access to the online account, the email contains a link that will automatically take users to an attacker’s webpage where they will be redirected to another website or website with malicious code.
Phishing emails usually contain a seemingly legitimate link that directs the user to a legitimate-looking webpage to view the page. The page can be a webpage with content that appears safe, but is actually containing a malicious code to steal the victim’s information, authentication tokens, and password. If you’d like to learn more, check this out!

 

Post a Comment