Day 4 Of #CyberSecurity/ #ethicalhacking for Beginners.

Vulnerabilities and attacks

A vulnerability is a weakness in design, implementation, operation, or internal control.

#SSOT #tech #hackers #hacking
Thread
1/13 Image
2/13
Backdoor
A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls.
Denial-of-service attack

3/13
Denial of service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.
4/13
Direct-access attacks
An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it.They may also compromise security by making operating system modification installing software worms, keyloggers or using wireless microphone.
EavesdroppingEdit
5/13
Eavesdropping is the act of surreptitiously listening to a private computer "conversation" (communication), typically between hosts on a network.
6/13
Multi-vector, polymorphic attacks
Surfacing in 2017, a new class of multi-vector,[16] polymorphic[17] cyber threats combined several types of attacks and changed form to avoid cybersecurity controls as they spread.
7/13
Phishing is the attempt of acquiring sensitive information such as usernames, passwords, and credit card details directly from users by deceiving the users.
8/13
Privilege escalation
Privilege escalation describes a situation where an attacker with some level of restricted access is able to, without authorization, elevate their privileges or access level.
9/13
Reverse engineering
Reverse engineering is the process by which a man-made object is deconstructed to reveal its designs, code, architecture, or to extract knowledge from the object
10/13
Social engineering
Social engineering, in the context of computer security, aims to convince a user to disclose secrets such as passwords, card numbers, etc.
11/13
Spoofing

Spoofing is the act of masquerading as a valid entity through falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain.
12/13
Malware
Malicious software (malware) installed on a computer can leak personal information, can give control of the system to the attacker and can delete data permanently.
Thank you very much if you have made it up to this far. You are the best.
Please don't forget to share it by retweeting

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with South Sudan IT community 

South Sudan IT community  Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @SsdIct

14 Oct
General #CyberSecurity policies

General security policies affecting an employee using the internet are as follows:
👇👇👇👇
#SSOT #CybersecurityAwarenessMonth
Thread
1/6
2/6
Social media networks/applications

Many people have social media accounts, such as Twitter, Facebook, Instagram etc.These sites store personal details about everyone who has an account, and employees need to be careful with the information that they post on these sites.
3/6
Cognitive hacking
This is where a computer system attack relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is a social engineering attack and the information required could be found on your various social media websites.
Read 7 tweets
1 Oct
Our topic of today is a "PRINT FUNCTION" in python.

#SSOT #PYTHON #pythonlearning #Python #pythonprogramming #CyberSecurity #softwaredevelopment
In Python, the command print tells the program to display words or numbers on the screen. Here's a line of code that tells Python to display the words “Hello, World!”

print("Hello, World!")
print is a keyword—that is, a word that has special meaning for Python. It means, "Display what’s inside the parentheses." Note that print isn't capitalized. If you capitalize it, the program won’t run.
Read 9 tweets
12 Sep
Today we are going to talk about "DATA TYPES IN PYTHON"
Just follow the thread till the end.

#pythonprogramming #pythonlearning #SSOT #python
What is data type in python programming?

In python programming, a data type is an attribute of data which tells the compiler or interpreter how the programmer intends to use the data.
In python programming, data type is an important concept.

Variables can store data of different types, and different types can do different things.

Python has the following data types built-in by default, in these categories:
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(