Certified Cybersecurity Technician Information Security Attacks PDF

Summary

This document is about information security attacks. It provides an overview of information security attacks, their motives, goals, and objectives. It also describes hacking methodologies, social engineering attacks, and cryptographic attacks.

Full Transcript

Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Module Flow Understand Social Engineering Understand Information Security Attacks Attacks Describe Hacking Methodologies Understand Wireless Network- and Frameworks Understand Network-level Attacks specific Attacks 3 z ’ L U...

Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Module Flow Understand Social Engineering Understand Information Security Attacks Attacks Describe Hacking Methodologies Understand Wireless Network- and Frameworks Understand Network-level Attacks specific Attacks 3 z ’ L Understand IoT, OT, and Cloud Attacks 4 Understand Applicationlevel and OS-level Attacks Understand Cryptographic Attacks Understand Information Security Attacks Information security refers to the protection or safeguarding of information and information systems that use, store, and transmit alteration, and destruction. Information information from unauthorized access, disclosure, is a critical asset that organizations must secure. If sensitive information falls into the wrong hands, then the respective organization may suffer huge losses in terms of finances, brand reputation, customers, or in other ways. To provide an understanding of information security attacks, this module starts with an overview of such attacks. This section introduces the motives, goals, and objectives of information-security attacks, as well as the classification of attacks. Module 02 Page 146 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Attacks Exam 212-82 Motives, Goals, and Objectives of Information Security Attacks = Motive (Goal) + Method + Vulnerablliity A motive originates out of the notion that the and this leads to the threat of an attack on the system something valuable, Attackers try various tools and attack techniques to security policy and controls in order to fulfil their motives « in @ computer system or its Motives behind information security attacks v’ Disrupting business continuity v’ Stealing information and manipulating data v’ Creating fear and chaos by disrupting critical infrastructures v’ Causing financial loss to the target v Damaging the reputation of the target Motives, Goals, and Objectives of Information Security Attacks Attackers generally attacks. A motive have motives originates out (goals), and of the objectives notion that behind a target their information system stores or security processes something valuable, which leads to the threat of an attack on the system. The purpose of the attack may be to disrupt the target organization’s business operations, to steal valuable information for the sake of curiosity, or even to exact revenge. Therefore, these motives or goals depend on the attacker’s state of mind, their reason for carrying out such an activity, as well as their resources and capabilities. Once the attacker determines their goal, they can employ various tools, attack techniques, and methods to exploit vulnerabilities in a computer system or security policy and controls. Attacks = Motive (Goal) + Method + Vulnerability Motives behind information security attacks = Disrupt business continuity = Propagate religious or political beliefs = Perform information theft = Achieve a state’s military objectives * Manipulating data = Damage the reputation of the target = (Create fear and chaos by disrupting = Take revenge * Bring financial loss to the target critical infrastructures Module 02 Page 147 = Demmaid tARCom Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser