Close In Attack
Close In Attack
A close-in attack involves someone attempting to get physically close to network components, data, and systems in order to learn more about a network Close-in attacks consist of regular individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information.
Close physical proximity is achieved through surreptitious entry into the network, open access, or both. One popular form of close in attack is social engineering in a social engineering attack, the attacker compromises the network or system through social interaction with a person, through an e—mail message or phone. Various tricks can be used by the individual to revealing information about the security of company.
The information that the victim reveals to the hacker would most likely be used in a subsequent attack to gain unauthorized access to a system or network.
No comments