From the course: CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management (2020)

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Impersonation attacks

Impersonation attacks

From the course: CompTIA CySA+ (CS0-002) Cert Prep: 2 Vulnerability Management (2020)

Start my 1-month free trial

Impersonation attacks

- [Instructor] You're probably already familiar with spam. It's hard to open your email inbox without being bombarded with unwanted messages. Let's take a look at how spam and its many cousins can be used as weapons of social engineering through impersonation attacks. Spam, also known as unsolicited commercial email, or UCE, consists of unwanted messages sent for a variety of marketing and scamming purposes. Most spam is illegal under the CAN-SPAM Act but it is difficult to prosecute offenders because it is often hard to identify them. Phishing is a subcategory of spam. Phishing messages have the explicit purpose of gaining access to an account. They want to trick users into revealing passwords to sensitive accounts such as bank accounts or employer systems. For example, an attacker might send thousands of email messages to random recipients warning them that their email accounts are running out of space and that…

Contents