Attack Scenarios I
In the following, we will look at various attack scenarios that can lead to a loss of data. Each individual attack always poses a threat to data protection and data security. It is therefore more important to recognise the attack scenarios.
You have probably heard of phishing, but what exactly does it mean?
A phishing attack is an attempt to obtain personal data of an Internet user via fake websites, e-mails or short messages and thus commit identity theft. This is done, for example, by imitating the website of a trustworthy organisation, such as the website of a bank. The corporate design of the affected entity is imitated, for example, the same company logos, fonts and layouts are used. The data obtained can be used to loot accounts and harm the persons concerned.
Remember, data loss usually leads to financial loss for the affected person. How can you better recognise phishers in the future?
Phishers pretend to be trustworthy persons and try to obtain sensitive data such as user names and passwords through fake electronic messages. Phishing messages are regularly sent by e-mail or instant messaging and ask the recipient to reveal secret access data on a prepared website or on the phone.
The Trojan horse is a danger not only in Greek mythology, but also in IT security. A Trojan horse is a computer program that is disguised as a useful application and fulfils another function in the background without the user’s knowledge. As a malicious program, the Trojan horse belongs to the group of so-called malware. And when we hear the word malware, we always think of data loss and the associated danger to data security and data protection.
Trojan horses are smuggled onto computers in order to execute functions not mentioned by the user. They are usually not noticed by the user because, for example, they have the file name of a useful file or have a useful functionality in addition to their actual function.