From cf583d2af20fd7ef338de97d6b07bbe22719db6e Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Sun, 24 Jul 2022 13:38:16 +1200 Subject: [PATCH] vault backup: 2022-07-24 13:38:15 --- ...threats-social-engineering-and-failures.md | 19 ++++++++++++++++++- 1 file changed, 18 insertions(+), 1 deletion(-) diff --git a/content/notes/03-threats-social-engineering-and-failures.md b/content/notes/03-threats-social-engineering-and-failures.md index 3efe12f8f..58eb0f87b 100644 --- a/content/notes/03-threats-social-engineering-and-failures.md +++ b/content/notes/03-threats-social-engineering-and-failures.md @@ -75,4 +75,21 @@ security is a never ending arms race. Security is improving but so are the numbe - more common - use scripts written by experts - do not understand the systems the are hacking - - + - packet monkeys: script kiddies that use worms to overload systems + - cracker + - cracks or removes software protections designed to precent unauthorized duplication + - also crack passwords + - phreaker + - hacks the public telephone system to make free calls or disrupt services + - more specific +- also includes password attacks + - brute force- tried all possible combinations + - dictionary - include information related to the target user + - rainbow tables - a hacker with access to encrypted password, they can find the corresponding plaintext in a dataset called a rainbow table + - social engineering - e.g., attacks as posing at IT professionals to gain access toa systems information (normally by contacting other employees) + +# Forces of nature +- fire, flood, lightening, earthquake, eruptions, etc. +- can use controls to protect against these +- very dynamic +- unpre \ No newline at end of file