COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Give at least 3 types of attack vectors
A
Social Network
B
USB
C
Mobile Device
D
Printer
Explanation: 

Detailed explanation-1: -Software vulnerabilities. Compromised user credentials. Weak passwords and credentials. Malicious employees. Poor or missing encryption. Ransomware. Phishing. Misconfigured devices. More items

Detailed explanation-2: -This category covers the misuse of a platform feature or the failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.

Detailed explanation-3: -M2: Insecure Data Storage – Portpass app. M3: Insecure Communication – Google apps. M5: Insufficient Cryptography – Slack app. M7: Client Code Quality – Klarna banking and payment app. M8: Code Tampering – Apple iMessage. 29-Nov-2022

Detailed explanation-4: -Malicious Apps and Websites. Like desktop computers, mobile devices have software and Internet access. Mobile Ransomware. Phishing. Man-in-the-Middle (MitM) Attacks. Advanced Jailbreaking and Rooting Techniques. Device and OS exploits.

Detailed explanation-5: -Digital attack surface. Physical attack surface. Social engineering attack surface.

There is 1 question to complete.