What are the 3 types of hacker?
What is a vulnerability?
A vulnerability is a weakness of a system, process , or architecture
What is an exploit?
An exploit is the act of taking advantage of a vulnerability
What is a zero-day exploit?
A zero-day exploit (aka zero-day attack) is one that takes advantage of a software vulnerability before the the software developer is aware of the vulnerability.
What is social engineering?
Social engineering involves manipulating social relationships to circumvent network security measures and gain access to a system
What is an insider threat?
An insider threat is someone trusted by an organisation who may have or develop malicious intent. Measures to reduce insider threat risks include:
- Perform background checks on new hires
- Enforce principle of least privilege (employees are given access to only what they need)
-Deploy a DLP that prevents sensitive data from being copied
What is an insider threat?
An insider threat is someone trusted by an organisation who may have or develop malicious intent. Measures to reduce insider threat risks include:
- Perform background checks on new hires
- Enforce principle of least privilege (employees are given access to only what they need)
-Deploy a DLP that prevents sensitive data from being copied
What is a DoS attack?
A DoS (denial-of-service) attack occurs when an intruder issues a flood of broadcast ping messages preventing legitimate users from accessing normal network resources
What are the types of DoS attacks?
What are the other types of attacks (other than DoS)?
What are the different types of Malware?
What are the characteristics of Malware?
What are some examples of social engineering?
Examples of social engineering include:
- Phishing
- Baiting
- Quid pro quo
- Tailgating
- Piggybacking
- Shoulder surfing