logo

Cyber Security Attacks and Techniques

Threat actors, threat vectors, and threat goals in cyber security attacks and techniques.

14 Pages1105 Words277 Views
   

Added on  2023-06-15

About This Document

This presentation covers various aspects of Cyber Security Attacks and Techniques, including current trends, threat actors, untargeted and targeted attacks, wireless vulnerabilities, IoT security issues, and more. It also provides examples and techniques used by attackers to infiltrate and escalate privileges, and how malware exploits un-patched systems. The presentation is a valuable resource for anyone interested in learning about cyber security.

Cyber Security Attacks and Techniques

Threat actors, threat vectors, and threat goals in cyber security attacks and techniques.

   Added on 2023-06-15

ShareRelated Documents
Cyber security attacks and
techniques
Cyber Security Attacks and Techniques_1
Threats
Describe and provide a minimum of three examples for each of the following:
Threat actors
A state sponsored actor is one of the threat actors whose target is any and every
computer which gets motivated from the cyber warfare for political and economic
agendas. Its best defense is the patch for vulnerability management. Organized
cybercrime is the second thread actor whose target is the enterprises and motivation
are the financial gain and profits along with the best defense are the good cyber
hygiene. Hacktivist is the third threat actor whose target is the government entities
and corporations and motivations are the political and environmental causes which
have the best defense of understanding the TTP.
Cyber Security Attacks and Techniques_2
Current trends
Identify and describe trends in cyber attacks, including the impact of
cyber threat vectors
Current trends in cyber attack which the hacker chooses to fulfill their
negative intentions. For example threat vectors which includes
malware and phishing along with the man in the middle attacks and
denial of service attack which is followed by the SQL injections and
zero day exploit and also the password attack. Moreover and other
trends of Cyber attack are the cross site scripting and dive by
download and many more (Shaukat, Luo, Varadharajan and Li, 2020).
Cyber Security Attacks and Techniques_3
Untargeted and targeted
attacks
List and provide at least one example for each of the categories of
vulnerabilities used in:
Untargeted cyber attacks
Un targeted attacks are the attacks in which the attackers indiscriminately
focus on the devices and services. They don't know about the victims
and the vulnerabilities will be the large number of machines and services
owned or provided by the organizations. malware is one of the examples
which includes the worms and computer viruses along with the Trojan
horses and spyware (Torres, Comesaña and Garcia-Nieto, 2019).
Cyber Security Attacks and Techniques_4

End of preview

Want to access all the pages? Upload your documents or become a member.