A method or pathway used by a cybercriminal to access or penetrate the target system. We have designated four main categories commonly employed. They are phishing, vishing, impersonation, and SMiShing.
« Back to Glossary IndexA method or pathway used by a cybercriminal to access or penetrate the target system. We have designated four main categories commonly employed. They are phishing, vishing, impersonation, and SMiShing.
« Back to Glossary Index