Attacker calls their victim, asking about the victim's extended car warranty
Vishing
This malicious software encrypts the victim's data
Ransomware
Occurs when an attacker sends many packets with fake MAC address to overflow the switch table
MAC flooding
This person would attack a website that promotes the sale of animal fur.
Hacktivists
Opening ports that are not being used as a service on your server
Open Ports and Services
Attacker sends email to the IT dept. asking about their server storage.
Spear Phishing
This malicious software can spread without any interaction
Worm
An adversary sets up a fake access point to trick people into connecting to it instead of a legit one.
Evil Twin
This hacker is sponsored by a nation
State Actors
This type of vulnerability is not in documentation anywhere, until after it is used
Zero-day
Tailgating
This malicious software is lays dormant until it is triggered by an event
Logic Bomb
Attacker sends unsolicited message to a Bluetooth-enabled device
Bluejacking
This person is a disgruntled employee
This type of vulnerability occurs when all or many accounts have root/admin privileges
Unsecured Root accounts
Attacker emails someone claiming to be their boss, telling the employee they need to give an account full permissions.
Impersonation
This malicious software gives remote access to an attacker
RAT - remote access trojan
Fake infomation is added to the cache of a DNS server, so that DNS queries result in incorrect replies
DNS Poisoning
This person can find vulnerabilities and use known exploits against the vulnerabilities.
Script Kiddie
This type of vulnerability occurs when you purchase equipment or applications and use them with their out of the box settings
Default Settings
Attacker creates a malicious website that pretends to sell baseballs to target a baseball team.
Watering Hole Attack
This malicious software is placed when the attacker wants a way back into their victim's environment
Backdoor
Attacker forces target to lose internet connection, often combined with evil twin attack
Disassociation
This group uses advanced tactics and techniques, their attacks often have several layers to them and may persist over a long period of time.
APT - Advanced Persistent Threat
Improper or weak patch management