Attacks & Attackers
“social engineering”
guessing
short dictionary or sweet list
long dictionary
exhaustive
browsing
eavesdropping
spoofing
password grabbers
Trojan Horses
Previous slide
Next slide
Back to first slide
View graphic version
Notes:
In order to evaluate the adequacy of security measures, one must be able to test them against attacks and attackers.