Information Security Threats and Vulnerabilities PDF

Summary

This document covers information security threats and vulnerabilities. It discusses various threat vectors and includes examples such as ransomware and social engineering. The document also mentions classroom activities and in-class practice sessions.

Full Transcript

Cybersecurity Technician MODULE 1 ICT 320 Information Security Threats and Vulnerabilities k Review at is Cyber Security? hin the goal of cyber security, what is the CIA triad? at are the five critical elements in AAA framework? multi-factor authe...

Cybersecurity Technician MODULE 1 ICT 320 Information Security Threats and Vulnerabilities k Review at is Cyber Security? hin the goal of cyber security, what is the CIA triad? at are the five critical elements in AAA framework? multi-factor authentication, there are three things. Please give example on each c Classroom Activities - What is Threat Vector means? - What are the vectors that attacker can get to: - Organization? - Personal Devices? - Mobile Devices? - Cloud Server? - Your Email account? Facebook Account? - Banking App? Ransomware (e.g., wannacry, Tesla Crypt, etc.) In-Class Practice1: Ransomware with GO In-Class Practice2: Social Engineering for Masking Malware In-Class Practice3: Botnet

Use Quizgecko on...
Browser
Browser