In this video, Emmanuel Henri provides an overview of what systems are at risk in an organization.
- [Narrator] Before we can start on discussing some of the typical attacks, we need to cover what systems are at risk in your organization or your client's. As a general rule, any device or system that is connected to the internet is at risk. That includes all your mobile devices, your computer you're watching this course on, your intelligent speakers, smart TVs or appliances, connected eating systems, entire server forums and the list goes on and on. Today, almost everything we use is connected to the internet and could be used by a hacker to get accessed data or use it as a starting point to do evil acts onto another system.
Therefore, any system that is connected to a device or system connected to the internet is at risk. Hackers can leverage a piece of hardware or system to attack others that aren't connected to the internet. A perfect example, a hacker could get access to your device in an unsecured WiFi network such as airport WiFis and then use your system to access secure data in your company. A hack typically involves multiple steps to access the final system.
Also, all applications you use have the potential of being hacked, or could include corrupted code. And more often than not, these applications are connected to the web. A hacker could literally access a patch from your favorite application or game, insert malicious code there and then when you start the application, get access to your system. So in conclusion, unless your device is completely disconnected from any other services or systems, they are at risk.
This is why and with hackers using new ways to get to your systems, everyone should always be vigilant with their devices and security experts are needed within organizations to help improve prevention.
Released
12/5/2018- What types of systems are at risk?
- What are the most common security threats?
- Data breaches and losses
- Denial-of-service attacks
- Internet of Things (IoT) risks
- Unsecured applications
Share this video
Embed this video
Video: What types of systems are at risk?