Week_1_Infographics

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

ADVANCED CYBERSECURITY

TRAINING FOR TEACHERS (ACTT)

Advanced Cyber Attacks


Wireless and Mobile Device
Attacks
Wardriving
Jamming
Common attack vectors
Compromised credentials
Rogue Access Points Application and Web Attacks
Evil Twin Access Points Rootkit
Weak and stolen credentials
Packet capturing and sniffing Keyloggers
Malicious insiders
War shipping Watering Hole Attack
Misconfiguration
Bluetooth Exploits Drive-by Download
System vulnerabilities
Malware Malvertising
Malware
Phishing Website spoofing
Insecure connections
Securing Mobile Devices
Causes of Internal Threats
Lock the device when not in use Securing Application
Employee sabotage
Use secure applications e.g and Websites
WhatsApp
Unauthorised access Patch and update software applications
Update your device
Weak cybersecurity measures Regularly scan the device for malware
Do not connect to public Wi-Fi
Accidental loss or disclosure of data Visit secure websites with HTTPS
Install an anti-virus software
Damage to computer equipment from fire, connections
Protect device using patterns,
flooding, power loss, or terrorism. Use two-factor authentication tools
strong passwords or fingerprint
Use safe browsing tools, e.g AVG
Secure Browser

You might also like