- Race conditions

è A source of vulnerability when the required ordered or timed events do not occur in the correct order or proper timing

- Weaknesses in security practices

è Developers should not attempt to create their own security algorithms because it will likely introduce vulnerabilities (Advised to use security lib that have already created , tested and verified)

- Access-control problems

è Controlling on who does what and ranges from managing physical access to equipment to dictating who has access to a source

Man-in-the-middle (MitM) – Allows the attacker to control over a device without the user knowledge

Man-in-in-the-mobile(mitM0) – A type of attack used to take control over a mobile device

Symptoms of Malware

- Increase in CPU usage

- Decrease in computer speed

- Computer freezes and crashes often

- Decrease in web browsing speed

- Unexplainable problems with network connections

- Files are modified , deleted

- Unknown processes running

Social engineering

- Pretexting ( Attacker calls an individual and lies to them in an attempt to gain access to privileged data)

- Tailgating (Attacker quickly follows an authorized person into a secure location)

- Something for Something (Quid pro quo) - Attacker requests personal information from a party in exchange for something, like a free gift

Wi-fi Password cracking

- Social engineering (Manipulates a person who knows the password into providing it)

- Brute-force attacks (Tries several possible passwords in an attempt to guess the password

- Network sniffing (By listening and capturing packets sent on the network )

Dos

- Overwhelming Quality of Traffic

è This causes a slowdown in transmission or response, or a crash of a device

- Maliciously Formatted Packets

è Is when receiver is unable to handle

è This causes the receiving device to run very slowly or crash

SEO Poisoning (Search Engine Optimization)

- A set of techniques used to improve a website's ranking by a search engine

- Common goal : Increase traffic to malicious sites that may host malware or perform social engineering

Blended attacks

- Attacks that use multiple techniques to compromise a target

- Trend: Revealing more complex malware and placing user data at great risk

Impact Reduction

- Communicate the issue

- Be sincere and accountable in case the company is at fault

You've reached the end of published parts.

⏰ Last updated: Sep 25, 2020 ⏰

Add this story to your Library to get notified about new parts!

Learn about cybersecurityWhere stories live. Discover now