Social-Engineering-Varianten: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| (4 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 1: | Zeile 1: | ||
| + | *[[Shoulder Surfing]] | ||
| + | *[[Tailgating]] | ||
| + | *[[Dumpster Diving]] | ||
| + | *[[Eavesdropping (Abhören)]] | ||
*[[Baiting]] | *[[Baiting]] | ||
| − | |||
*[[Pretexting]] | *[[Pretexting]] | ||
| − | |||
*[[Phishing]] | *[[Phishing]] | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
*[[Vishing und Smishing]] | *[[Vishing und Smishing]] | ||
| − | |||
| − | |||
| − | |||
*[[Quid-pro-Quo]] | *[[Quid-pro-Quo]] | ||
| − | |||
| − | |||
| − | |||
| − | |||
*[[Contact Spamming und E-Mail-Hacking]] | *[[Contact Spamming und E-Mail-Hacking]] | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
*[[Pharming und Hunting]] | *[[Pharming und Hunting]] | ||
| − | *[[ | + | *[[E-Mail-Harvesting]] |
| − | |||
| − | |||
| − | |||
=Quellen= | =Quellen= | ||
*https://www.kaspersky.de/resource-center/threats/how-to-avoid-social-engineering-attacks | *https://www.kaspersky.de/resource-center/threats/how-to-avoid-social-engineering-attacks | ||
*https://www.also.com/ec/cms5/de_6000/6000/blog/vlog/artikel/zukunftstechnologien/social-engineering-techniken-und-wie-man-angriffe-verhindert_40193.jsp | *https://www.also.com/ec/cms5/de_6000/6000/blog/vlog/artikel/zukunftstechnologien/social-engineering-techniken-und-wie-man-angriffe-verhindert_40193.jsp | ||