You are on page 1of 11

Part 4

Cybersecurity Threats,
Vulnerabilities, Attacks
and Solutions

1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 1


CYBER THREATS
Activity-Identity types of
malicious code
Identity, Email and browser attacks
Solution to attacks
 First, the organization’s users must be
educated.
 By learning about social engineering,
phishing, and forms of spying, the users
can learn how to protect their passwords.
 Additionally, IT policies must ensure that
users only use strong passwords, and
change their passwords often.

1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 9


Solution to attacks (2)
 In some cases, organizations use a different approach than
the password, which is sometimes referred to as “what you
know”. Instead, two other approaches are “what you have”
and “who you are”.
 In the former case, the access process includes possession of
some kind of key. The most common form of key is a key
card (swipe card). Perhaps this can be used along with a
password so that you must physically possess the key and
know the password to log in.
 In the latter case, the “who you are” constitutes some
physical aspect that cannot be reproduced. Biometrics are
used here; whether in the form of a fingerprint, voice
identification match, or even a lip print, the metric cannot
be duplicated.
1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 10
Attack Solutions  Part 4
Section 2
Target Vulnerability Control

For further details click here

1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 11

You might also like