From the course: CompTIA CySA+ (CS0-002) Cert Prep: 5 Security Operations and Monitoring

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Malicious email content

Malicious email content

From the course: CompTIA CySA+ (CS0-002) Cert Prep: 5 Security Operations and Monitoring

Start my 1-month free trial

Malicious email content

- [Instructor] Email is one of the most commonly exploited threat vectors. Attackers often send email to their targets seeking to get them to take some action that offers the attacker an initial foothold from which to launch their attack. Email is the most common threat vector for a simple reason. It is very easy to exploit. In its most basic form, email has very few security features, and it's trivial for even a moderately skilled attacker to send forged email messages. Email relies on a protocol called the Simple Mail Transfer Protocol, or SMTP. SMTP is used to transfer messages around the internet, beginning at the originating user's system, then traversing a series of email servers until the message reaches its final destination. The major flaw inherent in SMTP is that it doesn't include any authentication for those relayed messages. Anyone can easily insert a message into the email system with any to and from…

Contents