W02D2 - Risk and Vulnerability Assessment
W02D2 - Risk and Vulnerability Assessment
To start . . .
Does anyone have any questions they have not had answered yet?
Today . . .
What to expect
5. 5. Next Steps
Denial of
Service
Distributed
Denial of
Service (DDoS)
Man-in-the-
Middle Attacks
(MITM)
Phishing
Spear
Phishing
Ransomware
Let’s reflect
What parts of the CIA Triad are
affected by an attack that tries
to put a backdoor into a
system?
Break Time
Any questions or thoughts
before we stop?
Threat Landscape
• The threat landscape is the big
picture of potential risks and
dangers people may face
online
https://youtu.be/lIFEOvOf2D4
Attack
• From TechTarget: “A cyber attack is any attempt to gain unauthorized
access to a computer, computing system or computer network with the
intent to cause damage. Cyber attacks aim to disable, disrupt, destroy or
control computer systems or to alter, block, delete, manipulate or steal the
data held within these systems.”
Vulnerability
• A weakness in a system's design, security procedures, internal controls, or
software that can be exploited by attackers
?
Today’s To Do . . .