From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Impersonation attacks

Impersonation attacks

From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Start my 1-month free trial

Impersonation attacks

- [Instructor] You're probably already familiar with spam. It's hard to open your email inbox without being bombarded with unwanted messages. Let's take a look at how spam and many other types of hoaxes can be used as weapons of social engineering through impersonation attacks. Spam also known as Unsolicited Commercial Email or UCE consists of unwanted messages sent for a variety of marketing and identity fraud purposes. Most spam is illegal under the CAN-SPAM Act but it's difficult to prosecute offenders because it's often hard to identify them. Phishing is a sub category of spam. Phishing messages have the explicit purpose of eliciting information. They want to trick users into revealing passwords to sensitive accounts such as bank accounts or their employer systems. Phishing messages are often used during the reconnaissance phase of a larger attack. For example, an attacker might send…

Contents