84.5k views
2 votes
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying social engineering techniques

1 Answer

0 votes

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Step-by-step explanation:

thank me later

User TheBetterJORT
by
7.4k points