From the course: Introduction to Pen Testing for Cybersecurity Professionals
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Leaking data via email or VoIP
From the course: Introduction to Pen Testing for Cybersecurity Professionals
Leaking data via email or VoIP
- [Instructor] Data loss in a company occurs when users leak data, either maliciously or accidentally. Email can pose a threat, as malicious email can lead to a data breach. Voice over IP is also a concern as it represents data in motion, and a hacker can tap into the stream and listen to the conversation if not encrypted. As a result, the ethical hackers should test email and VoIP communications to ensure they do not provide a path for unintentional disclosure. So now, let's talk about email. Hackers use all types of ploys to introduce malicious activity into an organization. One way is email and can include spam, spoofing, phishing, or farming, and is another way to leak confidential data, either as an attachment or in the message. So, if we talk about some of the email threats, there are several. Spam is dangerous, as an email can contain a link that sends a recipient to a bogus website. If the victim clicks…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Checking physical security3m 44s
-
(Locked)
Identifying wireless vulnerabilities3m 48s
-
(Locked)
Testing the website3m 24s
-
(Locked)
Leaking data via email or VoIP3m 36s
-
(Locked)
Safeguarding cloud services3m 56s
-
(Locked)
Assessing the mobile infrastructure2m 40s
-
(Locked)
Hacking the human3m 25s
-
(Locked)
-
-