From the course: Security Tips
Unlock this course with a free trial
Join today to access over 22,600 courses taught by industry experts.
Understanding common attacks
From the course: Security Tips
Understanding common attacks
- [Instructor] To compromise information or to attack systems, there's many different kinds of tools and tactics attackers can use. In this episode, I'll discuss common types of attacks and give you a little bit of explanation about how they work. One of the most widespread types of attacks is phishing, including the related attacks of spearphishing and catfishing. This kind of attack tries to trick a user into sharing personal information, usually a username and password for a website. Phishing is very broadly targeted, and nowadays it's usually kept out of most people's view by spam filters. The goal of phishing is to cast a wide net and to try to catch even a few people who are tricked into sharing their information with a fraudulent site or person. Spearphishing targets specific people or groups of people in order not just to collect some passwords from random victims, but to get those targeted people's information, usually in a very focused way. As compared with regular phishing,…
Contents
-
-
-
Use a password manager3m 3s
-
(Locked)
Choose good passwords3m 18s
-
(Locked)
Use two-factor authentication5m 22s
-
(Locked)
Security questions3m 39s
-
(Locked)
Smart home devices3m 24s
-
(Locked)
Secure your home Wi-Fi5m 40s
-
(Locked)
Laptop security5m 36s
-
(Locked)
Browse the web safely3m 52s
-
(Locked)
Block ads and trackers4m 57s
-
Recognize phishing emails5m 6s
-
(Locked)
Recognize phone scams6m 42s
-
(Locked)
Donate a computer safely3m 45s
-
(Locked)
Back up data securely2m 37s
-
(Locked)
Encrypt sensitive files9m 4s
-
(Locked)
Use a VPN service5m 5s
-
Browse the web with Tor4m 45s
-
(Locked)
Social media security options6m 20s
-
(Locked)
Mobile device security5m 14s
-
(Locked)
Stay secure on shared computers6m 9s
-
(Locked)
Scan for viruses and malware5m 45s
-
(Locked)
Stay secure when traveling6m 56s
-
(Locked)
Keep work and home information separate5m 21s
-
(Locked)
Use the cloud securely2m 8s
-
(Locked)
Cache and cookies5m 54s
-
(Locked)
Spear phishing and catfishing4m 55s
-
(Locked)
Understanding and preventing ransomware2m 29s
-
(Locked)
Keeping an eye on your own security4m 8s
-
(Locked)
What's a URL?6m 28s
-
(Locked)
Turning on and using full-disk encryption2m 13s
-
(Locked)
What to do if your information is compromised5m 34s
-
(Locked)
How to tell if a link is legitimate4m 3s
-
(Locked)
Understanding biometric security3m 26s
-
(Locked)
What is public key encryption?3m 3s
-
(Locked)
Build a portable apps USB6m 41s
-
(Locked)
Handling information securely3m 54s
-
(Locked)
Understanding common attacks5m 17s
-
(Locked)
Paying securely online5m 45s
-
(Locked)
Wireless security for mobile phones4m 3s
-
(Locked)
Chatting securely4m
-
(Locked)
Configuring 2FA with Authy3m 45s
-
(Locked)
Configuring 2FA with 1Password3m 28s
-
(Locked)
Securing your email account2m 38s
-
(Locked)
Encrypted email2m 29s
-
(Locked)
Steganography2m 24s
-
(Locked)
Exploring app permissions2m 36s
-
(Locked)
Using kiosk mode in Windows 104m 5s
-
(Locked)
Using a separate network for your IoT devices4m 26s
-
(Locked)
Adding a guest account to your computer4m 52s
-
(Locked)
Safely donating mobile devices3m 38s
-
(Locked)
Learn more about security with LinkedIn Learning2m 22s
-