Information Gathering - Phishing | Attempt to gather information on a user or a system through phishing methods. Including; | | ENISA and Europol EC3, 2017 |
Intrusion Attempt and Intrusion - Login attempt | Attempt to log in to services or authentication / access control mechanisms. Including: Unsuccessful login by using sequential credentials for gaining access to the system (Brute-force attempt:, Art. 2, 6 and 11 [A] - Art. 3,7 and 8 [F]) Unsuccessful acquisition of access credentials by breaking the protective cryptographic keys. (Password cracking attempt: - Art. 2, 6 and 11 [A] - Art. 3,7 and 8 [F]) Unsuccessful login by using system access credentials previously loaded into a dictionary. (Dictionary attack attempt: - Art. 2, 6 and 11 [A] - Art. 3,7 and 8 [F])
| | ENISA and Europol EC3, 2017 |