Lesson 2 Cybersecurity Risks and Vulnerabilities

Introduction to Risks And Vulnerabilities

Cybersecurity assets

Cybersecurity vulnerabilities

Cybersecurity risks

Table 1.1: Types of cyber attack actors

Lesson 2 Cybersecurity Risks and Vulnerabilities

Organized Crime Groups

Viruses

Lesson 2 Cybersecurity Risks and Vulnerabilities

Worms

Trojans

Ransomware

Adware

Spyware

Types of Cyberattacks

Lesson 2 Cybersecurity Risks and Vulnerabilities

Social Engineering Attacks

Lesson 2 Cybersecurity Risks and Vulnerabilities

Denial-of-Service (DoS) and Distributed Denial-of- Service (DDoS) Attacks

Man-in-the-Middle (MitM) Attacks

Lesson 2 Cybersecurity Risks and Vulnerabilities

SQL Injections

Cross-Site Scripting (XSS) Attacks

Attacks by Advanced Persistent Threat (APT)

Lesson 2 Cybersecurity Risks and Vulnerabilities

Zero-Day Exploits

Password Attacks

Malvertising

Lesson 2 Cybersecurity Risks and Vulnerabilities

Eavesdropping

Security Information and Event Management (SIEM) Solutions

Lesson 2 Cybersecurity Risks and Vulnerabilities

Cybersecurity Risk Identification, Mitigation, and Management

Risk Management

Lesson 2 Cybersecurity Risks and Vulnerabilities

Risk Treatment

Table 1.2: Tools for cybersecurity risk identification, mitigation, and management

Lesson 2 Cybersecurity Risks and Vulnerabilities

Read the sentences and tick True or False.

Define what malware is.

Lesson 2 Cybersecurity Risks and Vulnerabilities

Explain what a computer virus is and how it works.

Compare and contrast the characteristics of viruses, worms, trojans, and ransomware.

Analyze public Wi-Fi networks' potential risks and benefits and how users can protect their devices.

Lesson 2 Cybersecurity Risks and Vulnerabilities

Explain the importance of staying aware for malvertising attacks.

Evaluate the effectiveness of Security Information and Event Management (SIEM) solutions in detecting and responding to security threats.

Compare and contrast DoS and DDoS attacks.

Lesson 2 Cybersecurity Risks and Vulnerabilities

Identify and explain the steps an organization can take to protect against zero-day exploits.

Assess the impact of SQL injection attacks on a web application.

List two example activities that are part of risk identification, mitigation, and management.