As described in the chapter case, which of the following did hackers use to gain access to the DNC network? Trojan horse Computer worm Pharming attack Phishing emails SQL injection attack

Respuesta :

Answer:

Phishing Emails

Explanation:

Phishing is a type on attack in which attacker pose as a trustworthy entity and lure it's victim to giving away confidential information to attacker.

There are many type of phishing attacks including phishing emails, text message, website links.

To get access to DNC network hackers used email phishing and sent the victim an link to update his password which resulted in attacker giving away his email credentials which gave hackers access to victim emails.

The also used an URL shortener to mask actual link. Using email account of victim the attackers created more spoof email accounts used it to target more people in another spearfishing attack resulting in giving them access to more accounts as the used convincing documents as attachments in email to build trust.

Further explanation

Phishing is the act of obtaining personal information such as User ID, Password and other sensitive data by posing as an authorized person or organization through an email. The emergence of the term phishing comes from the English word fishing (which means fishing), in this case attracting targets to provide important information such as financial information and passwords they have.

Phishing Techniques

1. Social Engineering, this technique is very powerful used by hackers to capture important information without complicated effort to the public to have a reaction to important events ,.

2. Link Manipulation, this technique is to mislead the user by clicking on one of the URLs in the legimate e-mail sent by the hacker, all e-mails are original from the company that sent it, but there is one link that is deflected by the hacker that will go to another server.

3. Filter Evasion, this technique to avoid phishing / filter phishing, will usually paste the image for phishing, so that the phishing filter made by the developer can not know whether there is phishing or not.

4. Website Forgery, manipulates the original website in such a way that victims are not aware of visiting phishing websites that are useful for capturing user names and passwords that are mistyped into the site.

5. Phone Phishing, this technique is used by hackers to trick users, usually sending emails with the original logo of the bank used by the user.

Learn  More

Phishing : https://brainly.com/question/13901444

Details

Class: high school

Subject: computers and technology

Keywords : Phishing, hack, information, techniques

ACCESS MORE