Phishing and Physical control: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Add links.)
 
imported>Doug Williamson
m (Added category)
 
Line 1: Line 1:
''Cybercrime''.
A physical control is an example of an internal control.<br />
Physical controls are mechanisms for protecting documents and technology from unauthorised physical access.<br />


Phishing is an email-based fraud.
For example, keeping payment media in a locked separate location.<br />


The fraudsters send emails purporting to be from reputable companies or other legitimate sources, in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
:<span style="color:#4B0082">'''''Most common attacks'''''</span>
:"The most common attacks seen across the Barclays network are phishing scams, through which cybercriminals send malicious emails to gain access to networks and personal information."
:''Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.''
The name 'phishing' is a grim joke variant on 'fishing'.




== See also ==
== See also ==
*[[Advanced Persistent Threat]]
*[[Access control]]
* [[BEC]]
*[[Internal control]]
* [[Cybercrime]]
*[[Personnel control]]
* [[Cybercrime – A Threat And An Opportunity]]
* [[Hacktivist]]
* [[Internet]]
*[[Smishing]]
* [[Spear phishing]]
* [[Spoofing]]
*[[Vishing]]
* [[Whaling]]


[[Category:Identify_and_assess_risks]]
[[Category:Manage_risks]]
[[Category:Manage_risks]]
[[Category:Technology]]

Latest revision as of 09:15, 3 June 2015

A physical control is an example of an internal control.
Physical controls are mechanisms for protecting documents and technology from unauthorised physical access.

For example, keeping payment media in a locked separate location.


See also