- Race conditions
è A source of vulnerability when the required ordered or timed events do not occur in the correct order or proper timing
- Weaknesses in security practices
è Developers should not attempt to create their own security algorithms because it will likely introduce vulnerabilities (Advised to use security lib that have already created , tested and verified)
- Access-control problems
è Controlling on who does what and ranges from managing physical access to equipment to dictating who has access to a source
Man-in-the-middle (MitM) – Allows the attacker to control over a device without the user knowledge
Man-in-in-the-mobile(mitM0) – A type of attack used to take control over a mobile device
Symptoms of Malware
- Increase in CPU usage
- Decrease in computer speed
- Computer freezes and crashes often
- Decrease in web browsing speed
- Unexplainable problems with network connections
- Files are modified , deleted
- Unknown processes running
Social engineering
- Pretexting ( Attacker calls an individual and lies to them in an attempt to gain access to privileged data)
- Tailgating (Attacker quickly follows an authorized person into a secure location)
- Something for Something (Quid pro quo) - Attacker requests personal information from a party in exchange for something, like a free gift
Wi-fi Password cracking
- Social engineering (Manipulates a person who knows the password into providing it)
- Brute-force attacks (Tries several possible passwords in an attempt to guess the password
- Network sniffing (By listening and capturing packets sent on the network )
Dos
- Overwhelming Quality of Traffic
è This causes a slowdown in transmission or response, or a crash of a device
- Maliciously Formatted Packets
è Is when receiver is unable to handle
è This causes the receiving device to run very slowly or crash
SEO Poisoning (Search Engine Optimization)
- A set of techniques used to improve a website's ranking by a search engine
- Common goal : Increase traffic to malicious sites that may host malware or perform social engineering
Blended attacks
- Attacks that use multiple techniques to compromise a target
- Trend: Revealing more complex malware and placing user data at great risk
Impact Reduction
- Communicate the issue
- Be sincere and accountable in case the company is at fault
YOU ARE READING
Learn about cybersecurity
General FictionMy notes on cybersecurity . Hope that after you read this, it will help you strengthen your knowledge in cybersecurity. Do correct me if somewhere I wrote was wrong.
Basic knowledge
Start from the beginning
