Chapter 5
Social Engineering, Malware Threats, and Vulnerability Analysis
This chapter covers the following topics:
Social Engineering: Social engineering will continue to be a real threat because it targets humans (which are considered the weakest link in cybersecurity).
Malware Threats: Adversaries use malware such as ransomware, viruses, worms, Trojans, root kits, keystroke loggers (keyloggers), and spyware to attack numerous organizations and individuals.
Vulnerability Analysis: Numerous methodologies are used to find and analyze security vulnerabilities and decrease the threat of malware.
This chapter covers the most common types of attacks and exploits. It starts by describing attacks against the weakest link, which is typically the ...
Get CEH Certified Ethical Hacker Cert Guide, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.