Cyber Security L3
Cyber Security L3
Types of Cyberstalking
The three most common types of cyber stalking are as follows:
Email stalking: This type of stalking involves the sender sending hateful,
obscene, or threatening emails to the recipient. Sometimes the attacker may
also include viruses and spam in the email.
To some extent, firewalls and antivirus software can block attack vectors. But
no protection method is totally attack-proof. A defense method can quickly
become obsolete, as hackers are constantly updating attack vectors and
seeking new ones in their quest to gain unauthorized access to computers
and servers.
The most common malicious payloads are viruses, which can function as their
own attack vectors, Trojan horses, worms and spyware. Third-party vendors
and service providers can also be considered attack vectors, as they are a risk
to an organization if they have access to its sensitive data.