Mask-group

Chapter 2 - Index

Chapter 2 - Index



Chapter 2

Attacks, Concepts and Techniques:

2.0  Introduction

2.1  Analyzing a cyberattack

2.1.1  Security Vulnerabilities and Exploits

2.1.1.1  Finding Security Vulnerabilities

2.1.2  Types of Security Vulnerabilities

2.1.2.1 Categorizing security vulnerabilities

2.1.3  Types of Malware and symptoms

2.1.3.1  Types of malware

2.1.3.2  Symptoms of malware

2.1.4  Methods of infiltration

2.1.4.1 Social Engineering

2.1.4.2  Wi-Fi password cracking

2.1.4.3  Phishing

2.1.4.4 Vulnerability Exploitation

2.1.5  DoS and DDoS

2.1.5.1 DoS

2.1.5.2 DDoS

2.2  The Cybersecurity landscape

2.2.1 Blended Attack

2.2.1.1 What is a blended attack?

2.2.2 Impact Reduction

2.2.2.1 What is impact reduction?

2.3  Summary