0% found this document useful (0 votes)
5 views

Module n

Uploaded by

Ghassen Debbich
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Module n

Uploaded by

Ghassen Debbich
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Module 2 Summary:

Current state of affairs:

Network security relates directly to an organization's business continuity. Network security


breaches can disrupt e-commerce, cause the loss of business data, threaten people’s
privacy, and compromise the integrity of information. These breaches can result in lost
revenue for corporations, theft of intellectual property, lawsuits, and can even threaten public
safety. Many tools are available to help network administrators adapt, develop, and
implement threat mitigation techniques, including the Cisco Talos Intelligence Group. An
attack vector is a path by which a threat actor can gain access to a server, host, or network.
Attack vectors originate from inside or outside the corporate network. Data is likely to be an
organization’s most valuable asset. Various DLP controls must be implemented, that
combine strategic, operational, and tactical measures. Common data loss vectors include
email and social networking, unencrypted data devices, cloud storage devices, removable
media, hard copy, and improper access control.

Who’s Attacking our network?:

Understanding network security requires you to understand the following terms: threat,
vulnerability, attack surface, exploit, and risk. Risk management is the process that balances
the operational costs of providing protective measures with the gains achieved by protecting
the asset. Four common ways to manage risk are risk acceptance, risk avoidance, risk
reduction, and risk transfer. Hacker is a term used to describe a threat actor. White hat
hackers are ethical hackers using their skills for good, ethical, and legal purposes. Grey hat
hackers are individuals who commit crimes and do unethical things, but not for personal gain
or to cause damage. Black hat hackers are criminals who violate computer and network
security for personal gain, or for malicious reasons, such as attacking networks. Threat
actors include script kiddies, vulnerability brokers, hacktivists, cybercriminals, and state-
sponsored hackers. Many network attacks can be prevented by sharing information about
IOCs. Many governments are promoting cybersecurity. CISA and NCSA are examples of
such organizations.

You might also like