From the course: Cybersecurity at Work
Unlock the full course today
Join today to access over 24,000 courses taught by industry experts.
The anatomy of a cyber attack
From the course: Cybersecurity at Work
The anatomy of a cyber attack
(upbeat music) - We're in this conference room to watch a team conduct a cyber attack. I want to show you the steps of this attack so you understand how to defend your devices and your data. Remember when I mentioned that list of over 100,000 publicly known security vulnerabilities? - Oh yeah. The CVE, the Common Vulnerabilities and Exposures list. - Exactly. IT administrators and security teams use it to update and protect their systems. - It's also used by malicious characters like me to break into networks. - Meet the software and systems hacker. This person probes hardware, software and passwords to gain access to accounts. - I can crack any 10 character password in under two hours. It's tough work. I wish I could just scroll on Instagram all day. - I'm not just mindlessly scrolling. This is reconnaissance. - The second hacker represents another popular style of cyber attack, a social engineering hacker. They use…