Module n
Module n
Understanding network security requires you to understand the following terms: threat,
vulnerability, attack surface, exploit, and risk. Risk management is the process that balances
the operational costs of providing protective measures with the gains achieved by protecting
the asset. Four common ways to manage risk are risk acceptance, risk avoidance, risk
reduction, and risk transfer. Hacker is a term used to describe a threat actor. White hat
hackers are ethical hackers using their skills for good, ethical, and legal purposes. Grey hat
hackers are individuals who commit crimes and do unethical things, but not for personal gain
or to cause damage. Black hat hackers are criminals who violate computer and network
security for personal gain, or for malicious reasons, such as attacking networks. Threat
actors include script kiddies, vulnerability brokers, hacktivists, cybercriminals, and state-
sponsored hackers. Many network attacks can be prevented by sharing information about
IOCs. Many governments are promoting cybersecurity. CISA and NCSA are examples of
such organizations.