Attacks
Lulwa AlJeraisyにより
1. Social Engineering Attacks
1.1. Physiological
1.1.1. Impersonation
1.1.2. Phishing
1.1.2.1. Pharming
1.1.2.2. Spear Phishing
1.1.2.3. Whaling
1.1.2.4. Vishing
1.1.3. Spam
1.1.3.1. Text-Based Spam
1.1.3.2. Image Spam
1.1.4. Spim
1.2. Physical
1.2.1. Dumpster Diving
1.2.2. Tailgating
1.2.3. Shoulder Surfing
2. Network Attacks
2.1. Denial of Service (DoS)
2.1.1. Ping Flood Attack
2.1.2. Smurf Attack
2.1.3. SYN Flood
2.1.4. Distributed denial of service (DDoS)
2.2. Interception
2.2.1. Man-in-the-middle
2.2.1.1. Active
2.2.1.2. Passive
2.2.2. Reply Attacks
2.3. Poisoning
2.3.1. ARP
2.3.2. DNS
3. Malware
3.1. Infecting
3.1.1. Viruses
3.1.1.1. Program
3.1.1.2. Macro
3.1.1.3. Resident
3.1.1.4. Boot Virus
3.1.2. Worms
3.2. Concealing
3.2.1. Trojan Horses
3.2.2. Logic Bombs
3.2.3. Backdoors
3.2.4. Rootkits
3.3. Malware for Profit
3.3.1. Bootnets
3.3.2. Ransomware
3.3.3. Scamware
3.3.4. Spyware
3.3.4.1. Adware
3.3.4.2. Keyloggers