Cisco !#&? be a network ninja


To the top Chapter 1.1.1 Chapter 1.1.2 Chapter 1.1.3 Chapter 1.1.4 Chapter 1.1.5 Chapter 1.1.6 Chapter 1.1.7 Chapter 1.1.8 Chapter 1.1.9 Chapter 1.1.10 Chapter 1.1.11 Chapter 1.1.12 Chapter 1.1.13 Chapter 1.1.14 Chapter 1.1.15 Chapter 1.1.16 Chapter 1.1.17

Cybersecurity essentials

One course of Cisco's "Skills for all"

You'll Learn These Core Skills:

Module 1 - Cybersecurity Threats, Vulnerabilities and Attacks

Welcome to this module, which aims to explore the range of cybersecurity risks and threats that are ever-present in our world today.

Cybercriminals are constantly finding new ways to exploit vulnerabilities in systems and networks, often with the intention of stealing sensitive information and/or money.

As a cybersecurity professional, you must be able to consider the possibility of a cyber attack occurring (a threat), recognize what makes a target susceptible to an attack (a vulnerability) and understand the different types of cyber attacks and their effects.

Chapter 1.1 - Common Threats

1.1.1 Threat Domains

With organizations facing an ever-growing number of cyber threats, it is critical that they have robust security solutions in place. But in order to protect themselves, organizations first need to know what vulnerabilities exist within their threat domains. A ‘threat domain’ is considered to be an area of control, authority or protection that attackers can exploit to gain access to a system.

There are many ways that attackers can uncover vulnerabilities and exploit systems within a domain.

    Attackers can exploit systems within a domain through:

  • Direct, physical access to systems and networks.
  • Wireless networking that extends beyond an organization’s boundaries.
  • Bluetooth or near-field communication (NFC) devices.
  • Malicious email attachments.
  • Less secure elements within an organization’s supply chain.
  • An organization’s social media accounts.
  • Removable media such as flash drives.
  • Cloud-based applications.

Cybersecurity professionals can also use these domains to perform an analysis of an organization’s current cybersecurity status. In this module, we will look at the different types of domains that exist within an organization. It is important to approach cybersecurity risks from a multi-scale, systems perspective, taking into account the interaction of cyber, physical and human systems.

1.1.2

1.1.3

1.1.4

1.1.5

1.1.6

1.1.7

1.1.8

1.1.9

1.1.10

1.1.11

1.1.12

1.1.13

1.1.14

1.1.15

1.1.16

1.1.17

Skills for all