Introduction to Risks And Vulnerabilities
Cybersecurity assets
Cybersecurity vulnerabilities
Cybersecurity risks
Table 1.1: Types of cyber attack actors
Social Engineering Attacks
Denial-of-Service (DoS) and Distributed Denial-of- Service (DDoS) Attacks
Man-in-the-Middle (MitM) Attacks
SQL Injections
Cross-Site Scripting (XSS) Attacks
Attacks by Advanced Persistent Threat (APT)
Eavesdropping
Security Information and Event Management (SIEM) Solutions
Cybersecurity Risk Identification, Mitigation, and Management
Risk Management
Risk Treatment
Table 1.2: Tools for cybersecurity risk identification, mitigation, and management
Read the sentences and tick True or False.
Define what malware is.
Explain what a computer virus is and how it works.
Compare and contrast the characteristics of viruses, worms, trojans, and ransomware.
Analyze public Wi-Fi networks' potential risks and benefits and how users can protect their devices.
Explain the importance of staying aware for malvertising attacks.
Evaluate the effectiveness of Security Information and Event Management (SIEM) solutions in detecting and responding to security threats.
Compare and contrast DoS and DDoS attacks.
Identify and explain the steps an organization can take to protect against zero-day exploits.
Assess the impact of SQL injection attacks on a web application.
List two example activities that are part of risk identification, mitigation, and management.