Social-Engineering-Varianten: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| (7 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 1: | Zeile 1: | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
*[[Shoulder Surfing]] | *[[Shoulder Surfing]] | ||
*[[Tailgating]] | *[[Tailgating]] | ||
*[[Dumpster Diving]] | *[[Dumpster Diving]] | ||
| − | + | *[[Eavesdropping (Abhören)]] | |
| + | *[[Baiting]] | ||
| + | *[[Pretexting]] | ||
| + | *[[Phishing]] | ||
| + | *[[Vishing und Smishing]] | ||
| + | *[[Quid-pro-Quo]] | ||
| + | *[[Contact Spamming und E-Mail-Hacking]] | ||
| + | *[[Pharming und Hunting]] | ||
| + | *[[E-Mail-Harvesting]] | ||
=Quellen= | =Quellen= | ||
*https://www.kaspersky.de/resource-center/threats/how-to-avoid-social-engineering-attacks | *https://www.kaspersky.de/resource-center/threats/how-to-avoid-social-engineering-attacks | ||
*https://www.also.com/ec/cms5/de_6000/6000/blog/vlog/artikel/zukunftstechnologien/social-engineering-techniken-und-wie-man-angriffe-verhindert_40193.jsp | *https://www.also.com/ec/cms5/de_6000/6000/blog/vlog/artikel/zukunftstechnologien/social-engineering-techniken-und-wie-man-angriffe-verhindert_40193.jsp | ||