: This means gaining access by persuading people to hand
over passwords or security-related information unwittingly and
then using that information to access the system
DIRECT ATTACK
These may involve exploiting a server vulnerability to gain access and / or
attacking password hashes with dictionary or brute-force methods to reveal
passwords which give access to the system
Phishing
• This is a technique where official-looking emails are sent out to millions
of users in an attempt to fool them into clicking a link and entering personal
information. This information is then used for identity theft or to hack into
other systems. Because so many emails can be sent out at no cost, it only
takes a small percentage of people to fall for the trick for it to be successful.
Spear-phishing
• Spear-phishing is similar but it specifically targets the
user, often including information which is already known
about them and pretending to be from an individual or
organisation whom they already know. This increases the
chances that the user will believe it is from a legitimate
source