Communication and Network Security CCCS 451 Network Security: Threats, Vulnerabilities and Attacks–part 1
2At the end of this unit you will be able to: •Define network security essential terminologies •Explain what passive and active attacks are •Define social engineering attacks •Identify both different and common attacks at the application- level •Define network-level attacks Session Learning Outcomes
31.Use the emoticons to provide feedback to the instructor 2.Raise your handif you have a question about the class content or wish to speak –To talk, click the microphone icon –Click the icon again to mute itwhen you are finished speaking –Always mute your microphone when someone else is speaking 3.Use the chat or Technical support button from the myCourses Course Home page if you have technical problems–e.g. cannot see, cannot speak etc. Rules of the Class
Essential Terminologies
5Network Vulnerabilities
6Data Breach References:Bloom & Identity Theft Resource Center
7Essential Terminologies A data breach is a security incident in which information is accessed without authorization. Data BreachA vulnerability, is a flaw in code ordesign that creates a potentialpoint of security compromise foran endpoint or network.Vulnerability An attack is an action with malicious intention to interrupt the operations of a network or steal the data, etc. Attack An Exploit is taking advantage of a weakness or a flaw in thesystem to intrude, attack it.ExploitA Botnet is a remote-controlled robotic network or a network of computers set up to further attacks to the target computers or networks. Botnet The dark web, also known to as the darknet, is an encrypted portion of the internet that is not indexed by search engines. Dark Web
8Essential Terminologies Threat refers to anything that hasthe potential to cause seriousharm to a computer system.ThreatA computer threat that attempts to manipulate the computer application vulnerabilities that are undisclosed to the software developer. Zero Day Attack A payload is a piece of code to be executed through said exploit. Payload A cyber attack that is intended to redirect a website’s traffic to a masquerading website, which may be a fake one. Pharming A specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.
Want to read all 37 pages?
Previewing 9 of 37 pages Upload your study docs or become a member.
Want to read all 37 pages?
Previewing 9 of 37 pages Upload your study docs or become a member.
End of preview
Want to read all 37 pages? Upload your study docs or become a member.