Difference between revisions of "Attaks on Privacy"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Title or Meme== Attacks against a natural person's [{Priacy]] are the most common form attempts to steal a person's Identity or Attention. ==Context== In...")
 
(Attacks and Mitigations)
 
(10 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
==Full Title or Meme==
 
==Full Title or Meme==
[[Attacks]] against a natural person's [{Priacy]]  are the most common form attempts to steal a person's [[Identity]] or [[Attention]].
+
[[Attacks]] against a natural person's [[Privacy]]  are the most common form attempts to steal a person's [[Identity]] or [[Attention]].
  
 
==Context==
 
==Context==
In an area where any known [[Vulnerability]] is quickly closed, the best method to discover new only is to simple explore all, or selected high-value, systems that are exposed on the internet. This can be performed by either looking at existing traffic to emulate good traffic, or just brute-force pushing data at systems to see how they respond.
+
*Privacy here is considered to a a preferred state o human affairs so that each human can be as privacy as the desire with as little effort as possible.
 +
*There are two common goals of [[Attaks on Privacy]]:
 +
# Financial often by [[Identity Theft]] using methods like phishing.
 +
# [[Attention]] typically to ads that also enable the attacker to gain financially semi-legally.
  
==Examples==
+
==Attacks and Mitigations==
  
* [[Attaks on Privacy]]
+
* Deliberate UX confusion
 +
* Phishing
  
 
==Reference==
 
==Reference==

Latest revision as of 13:20, 13 February 2022

Full Title or Meme

Attacks against a natural person's Privacy are the most common form attempts to steal a person's Identity or Attention.

Context

  • Privacy here is considered to a a preferred state o human affairs so that each human can be as privacy as the desire with as little effort as possible.
  • There are two common goals of Attaks on Privacy:
  1. Financial often by Identity Theft using methods like phishing.
  2. Attention typically to ads that also enable the attacker to gain financially semi-legally.

Attacks and Mitigations

  • Deliberate UX confusion
  • Phishing

Reference