2/13
Backdoor
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.
Denial-of-service attack
3/13
Denial of service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.
4/13
Direct-access attacks
An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it.They may also compromise security by making operating system modification installing software worms, keyloggers or using wireless microphone.
EavesdroppingEdit
5/13
Eavesdropping is the act of surreptitiously listening to a private computer "conversation" (communication), typically between hosts on a network.
6/13
Multi-vector, polymorphic attacks
Surfacing in 2017, a new class of multi-vector,[16] polymorphic[17] cyber threats combined several types of attacks and changed form to avoid cybersecurity controls as they spread.
7/13
Phishing is the attempt of acquiring sensitive information such as usernames, passwords, and credit card details directly from users by deceiving the users.
8/13
Privilege escalation
Privilege escalation describes a situation where an attacker with some level of restricted access is able to, without authorization, elevate their privileges or access level.
9/13
Reverse engineering
Reverse engineering is the process by which a man-made object is deconstructed to reveal its designs, code, architecture, or to extract knowledge from the object
10/13
Social engineering
Social engineering, in the context of computer security, aims to convince a user to disclose secrets such as passwords, card numbers, etc.
11/13
Spoofing
Spoofing is the act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain.
12/13
Malware
Malicious software (malware) installed on a computer can leak personal information, can give control of the system to the attacker and can delete data permanently.
Thank you very much if you have made it up to this far. You are the best.
Please don't forget to share it by retweeting
• • •
Missing some Tweet in this thread? You can try to
force a refresh
General security policies affecting an employee using the internet are as follows:
👇👇👇👇 #SSOT#CybersecurityAwarenessMonth
Thread
1/6
2/6 Social media networks/applications
Many people have social media accounts, such as Twitter, Facebook, Instagram etc.These sites store personal details about everyone who has an account, and employees need to be careful with the information that they post on these sites.
3/6 Cognitive hacking
This is where a computer system attack relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is a social engineering attack and the information required could be found on your various social media websites.
In Python, the command print tells the program to display words or numbers on the screen. Here's a line of code that tells Python to display the words “Hello, World!”
print("Hello, World!")
print is a keyword—that is, a word that has special meaning for Python. It means, "Display what’s inside the parentheses." Note that print isn't capitalized. If you capitalize it, the program won’t run.