From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Watering hole attacks

Watering hole attacks

From the course: CISSP Cert Prep (2021): 5 Identity and Access Management

Start my 1-month free trial

Watering hole attacks

- [Instructor] Watering hole attacks use sneaky techniques to lure unsuspecting users and infect their systems with malware. In nature, a watering hole is a place that animals gather particularly in dry climates. It's important that animals visit the watering hole because the water there is essential to their survival, but there are also significant risks Involved. First, diseases can spread easily at watering holes because all of the animals drink from a common source. Second, predators can lay in wait at the watering hole, waiting for prey to show up in need of a drink and then attack. In the electronic world, websites are great watering holes where you can spread malware. When a user visits a website, they trust that website to some extent, it's the digital equivalent of approaching someone you trust as opposed to being solicited by an unknown stranger. Web browsers as well as browser add-ins and extensions are common…

Contents