Cybersecurity Threats, Vulnerabilities, and Attacks

Get Started. It's Free
or sign up with your email address
Cybersecurity Threats, Vulnerabilities, and Attacks by Mind Map: Cybersecurity Threats, Vulnerabilities, and Attacks

1. -Never provide confidential information or credentials via email, chat sessions, in-person, or on the phone to unknown parties. -Resist the urge to click on enticing emails and website links.

2. Shoulder Surfing and Dumpster Diving Impersonation and Hoaxes Piggybacking and Tailgating Online, Email, and Web-based Deception Defending Against Deception

3. Deception Methods

4. -Cross-Site Scripting -Code Injection: XML Injection. SQL Injection. -Buffer Overflow -Remote Code Executions

5. -Grayware and SMiShing -Rogue Access Points -RF Jamming -Bluejacking and Bluesnarfing -WEP and WPA Attacks -Defending Against Wireless and Mobile Device Attacks

6. Application Attacks

7. Wireless and Mobile Device Attacks

8. -Overwhelming Quantity of Traffic -Maliciously Formatted Packets

9. Types of Cyber Attacks

10. Attacks

11. The term malware includes computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. Malware may be obvious and simple to identify or it can be very stealthy and almost impossible to detect.

12. Types of Malware

13. Social Engineering Authority Intimidation Consensus/Social Proof Scarcity Urgency Familiarity/Liking Trust

14. Pretexting Something for Something (Quid pro quo)

15. Spam Spyware, Adware, and Scareware Phishing Vishing, Smishing, Pharming, and Whaling Browser Plugins and Browser Poisoning Defending Against Email and Browser Attacks

16. Deception

17. Malware and Malicious Code

18. The Art of Deception

19. Email and Browser Attacks

20. By:Gabriel