In this video, Emmanuel Henri introduces data breaches and losses and what this type of attack involves.
- [Instructor] In the next few chapters,…we'll take a look at our most common attacks…and delve a little bit deeper…into these few types of attacks…by first exploring what it is, why it matters,…a case study related to the attack, and finally,…how to sell these potential services…surrounding this attack.…And we'll start with data breaches and losses.…Typically, a data breach is when a hacker…finds a way to access your data…and then corrupts it, holds it ransom, or deletes it.…Therefore, the result is the loss of data…or access to this data.…
This attack usually starts with some reconnaissance…where the hacker will try to discover…who has access to the data and how he could access it.…It could be a combination of which systems he could access…to who exactly have access to the system.…In this reconnaissance stage,…the hacker also tries to determine…what are the vulnerable spots in the system,…what type of script, such as a malware or trojans,…he could use to attack such systems.…Then, once the hacker has defined his potential targets,…
Author
Released
12/5/2018- What types of systems are at risk?
- What are the most common security threats?
- Data breaches and losses
- Denial-of-service attacks
- Internet of Things (IoT) risks
- Unsecured applications
Skill Level Intermediate
Duration
Views
Related Courses
-
Implementing an Information Security Program
with Kip Boyle2h 33m Intermediate -
Learning the OWASP Top 10
with Caroline Wong43m 57s Beginner
-
Introduction
-
Selling cybersecurity1m 11s
-
-
1. Overview of Systems and Threats
-
Resources for educating you2m 58s
-
Fictional vs. reality1m 27s
-
Top security threats1m 52s
-
2. Data Breaches and Losses
-
Why do data breaches matter?1m 31s
-
Case study: Data breach1m 40s
-
3. Denial of Service
-
4. Internet of Things
-
Overview of IoT risks1m 36s
-
Why does it matter?1m 42s
-
How to sell IoT risks1m 42s
-
-
5. Unsecured Applications
-
Why does it matter?1m 29s
-
Conclusion
-
Next steps1m
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Overview of data breaches and losses