Two-factor authentitication
A typical two-factor authentication process will first ask you to enter a password. If this is correct,
the system will send a code by text message to your mobile phone.
biometric authentitication
A biometric is a physical characteristic such as a fingerprint or facial image
access rights and access levels
MAC adress filtering
a unique number that is assigned to a network interface card when the card is manufactured
filter can be set up in 2 ways:
* safelist
* blocklist
safelist
used to specify the MAC addresses of devices that are allowed to connect to the network
blocklist
can be used to specify the MAC addresses of devices that are not allowed to connect to the network
firewalls
physical security
advantages of cloud and contemporary storage
disadvantages of cloud and contemporary storage
Social engineering
forms of cyberattacks
phinishing
an attack in which the victim receives a message
disguised to look like it has come from a reputable source (for example, a bank). The message will
include a link that, when clicked, will either trick the user into revealing personal data or initiate
the installation of malware on the victim’s device
pharming
shoulder surfing (shouldering)
It is often used to find out:
* Someone’s PIN at a cash machine
* The code to access a secure room
* Someone’s password whilst they type it on the keyboard
unpatched software
USB devices
any USB device can potentially be a security threat because it might contain malware that could be transferred to your system or copy data to the attacker via the Internet
eavesdropping
penetration testing
2 main types:
* black-box penetration
* white-box penetration
black-box penetration testing
white-box penetration testing
ethical hacker
network forensics
there are 2 approaches:
* One approach is to capture the data as it passes an inspection point and write it to disk so it can be analysed later. However, this method can generate huge amounts of data
* The data could be filtered so that only certain data is captured, but this will impact the performance of the network as each Packet would need to be inspected before being allowed to proceed
network audit software