O'Reilly logo

CompTIA Security+ SY0-401 In Depth by Mark Ciampa

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

chapter 2Malware and Social Engineering Attacks

After completing this chapter, you should be able to do the following:

• Define malware

• List the different types of malware

• Identify payloads of malware

• Describe the types of social engineering psychological attacks

• Explain physical social engineering attacks

Today’s Attacks and Defenses

A security test was recently conducted at a U.S. federal government agency that specializes in “offensive cybersecurity” and is charged with protecting national secrets. Previous security tests indicated that this agency was resistant to technology-based attacks. However, this time the testers used a completely different approach: they created a fake online profile of an attractive and intelligent young ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required