Learn how different types of attacks can threaten an organization. Lisa Bock explores various types of attacks such as: physical attacks - where objects are stolen, damaged, or destroyed, malware, brute force attacks, along with social engineering, a con game designed to get individuals to divulge sensitive information.
- [Voiceover] Information security is founded…on an overall organizational strategy…based on risk analysis.…The goal is to create, implement, monitor, assess,…maintain, and continuously improve a security posture.…Awareness of the various attacks…is an important step in this process.…Different types of attacks can threaten an organization,…such as physical, social engineering,…brute force, and others.…An attack can result in theft of information,…exposure to sensitive information.…
Consequences can range from loss of productivity,…damage to the business reputation,…and possible legal implications.…Physical security is often overlooked by an organization.…However, any object can be stolen, damaged,…or destroyed by an unauthorized individual.…Many attacks are linked to social engineering.…Examples include gaining unauthorized access to a facility,…cutting a fiber-optic backbone,…breaking into secure spaces, or stealing equipment,…such as a computer or hand-held device,…removing RAM or components from a desktop or laptop,…
Security expert Lisa Bock starts with an overview of ethical hacking and the role of the ethical hacker. She reviews the kinds of threats networks face, and introduces the five phases of ethical hacking, from reconnaissance to covering your tracks. She also covers penetration-testing techniques and tools. The materials map directly to the "Introduction to Ethical Hacking" competency from the CEH Body of Knowledge, and provide an excellent jumping off point for the next courses in this series.
Note: Our Ethical Hacking series will map to the 18 parts of the EC-Council's certification exam. Find more courses in the series on Lisa's author page.
- Ethical hacking principles
- Managing incidents
- Creating security policies
- Protecting data
- Conducting penetration testing
- Hacking in phases