First page Back Continue Last page Image
Confidentiality - Threats
- Packet Capture
- Ping Sweep and Port Scan
- Dumpster Diving
- EMI Interception
- Wiretapping
- MitM Attack
- Social Engineering
- Not Using Encryption
- Malware
- FTP Bounce
- Phishing
A List of Confidentiality Attacks
EMI - Electro Magnetic Interference
MitM - Man in the Middle