Cybersecurity Threats, Vulnerabilities, Attacks and Solutions
1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 1
CYBER THREATS Activity-Identity types of malicious code Identity, Email and browser attacks Solution to attacks First, the organization’s users must be educated. By learning about social engineering, phishing, and forms of spying, the users can learn how to protect their passwords. Additionally, IT policies must ensure that users only use strong passwords, and change their passwords often.
1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 9
Solution to attacks (2) In some cases, organizations use a different approach than the password, which is sometimes referred to as “what you know”. Instead, two other approaches are “what you have” and “who you are”. In the former case, the access process includes possession of some kind of key. The most common form of key is a key card (swipe card). Perhaps this can be used along with a password so that you must physically possess the key and know the password to log in. In the latter case, the “who you are” constitutes some physical aspect that cannot be reproduced. Biometrics are used here; whether in the form of a fingerprint, voice identification match, or even a lip print, the metric cannot be duplicated. 1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 10 Attack Solutions Part 4 Section 2 Target Vulnerability Control
For further details click here
1/5/2020 Prepared by ZIRARUSHYA Pierre Celestin 11