Information Security Threats and Vulnerabilities PDF
Document Details
Uploaded by FelicitousTuba
Tags
Related
- Certified Cybersecurity Technician Information Security Threats and Vulnerabilities PDF
- Certified Cybersecurity Technician Information Security Threats And Vulnerabilities PDF
- Certified Cybersecurity Technician Module 01 PDF
- Information Security and Management PDF
- Introduction To Information Security Terminology PDF
- Introduction To Information Security PDF
Summary
This document covers information security threats and vulnerabilities. It discusses various threat vectors and includes examples such as ransomware and social engineering. The document also mentions classroom activities and in-class practice sessions.
Full Transcript
Cybersecurity Technician MODULE 1 ICT 320 Information Security Threats and Vulnerabilities k Review at is Cyber Security? hin the goal of cyber security, what is the CIA triad? at are the five critical elements in AAA framework? multi-factor authe...
Cybersecurity Technician MODULE 1 ICT 320 Information Security Threats and Vulnerabilities k Review at is Cyber Security? hin the goal of cyber security, what is the CIA triad? at are the five critical elements in AAA framework? multi-factor authentication, there are three things. Please give example on each c Classroom Activities - What is Threat Vector means? - What are the vectors that attacker can get to: - Organization? - Personal Devices? - Mobile Devices? - Cloud Server? - Your Email account? Facebook Account? - Banking App? Ransomware (e.g., wannacry, Tesla Crypt, etc.) In-Class Practice1: Ransomware with GO In-Class Practice2: Social Engineering for Masking Malware In-Class Practice3: Botnet