1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Exploiting a vulnerability
An attacker can use techniques like social engineering and default credentials.
Malicious Code
• The attackers use any opportunity
- The types of malicious code are varied and many
• Many different forms
- Executable, scripts, macro viruses, worms, Trojan horse, etc.
• Protection comes from many different sources
- Anti-malware
- Firewall
- Continuous updates and patches
- Secure computing habits
Malicious Code Examples
• WannaCry ransomware
- Executable exploited a vulnerability in Windows SMBv1
- Arbitrary code execution
• British Airways cross-site scripting
- 22 lines of malicious JavaScript code placed on checkout
pages
- Information stolen from 380,000 victims
• Estonian Central Health Database
- SQL injection
- Breached all healthcare information for an entire country
<>
<>