A user received a malicious attachment but did not run it.
Which category classifies the intrusion?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The given scenario describes a situation where a user received a malicious attachment but did not execute it. To classify this intrusion, we need to understand the different stages of a typical cyber-attack. There are generally four stages of a cyber-attack:
Reconnaissance: In this stage, attackers gather information about their target. This can include identifying the target system's IP addresses, network topology, and vulnerabilities.
Weaponization: In this stage, attackers craft a weapon, such as a virus or malware, that they will use to compromise the target system. This weapon is usually disguised as a legitimate file or email attachment.
Delivery: In this stage, the weapon is delivered to the target system. This can be done through various means, such as email attachments, infected websites, or social engineering tactics.
Installation: In this stage, the weapon is executed on the target system, allowing the attacker to gain access to the system and carry out their objectives.
In the given scenario, the user received a malicious attachment but did not run it. This means that the attacker was unsuccessful in delivering the weapon to the target system, and therefore did not reach the installation stage.
Therefore, the intrusion can be classified as part of the delivery stage since the attacker attempted to deliver the weapon but was unsuccessful in executing it on the target system.
Hence, the correct answer is D. Delivery.