Objective:
This section introduces you to the most common threats to data confidentiality, integrity, and availability. After finishing this section, you should be able to :
- Describe the most common threats to data confidentiality.
- Describe the most common threats to data integrity.
- Describe the most common threats to data availability.
- Identify common social engineering techniques used by hackers to gain access to online data.
- Evaluate email messages to determine if they represent a possible social engineering attack
Links:
- TestOut Courseware: https://testout.com
Key Terms:
- Snooping Attempting to secretively discover private information about a person, company, or other entity.
- Wiretapping A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Social Engineering The use of deception to gain personal and/or private information for unlawful purposes.
- Reconnaissance The passive gathering of information about a potential victim.
- Pretexting Tricking a victim into revealing sensitive information under false pretenses.
- Email Attack Exploiting a victim using email messages.
- Browser Attack Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
- Man-in-the-Middle Attack An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
- Replay Attack An attempt to connect to a server by capturing and resending authentication information.
- Impersonation TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
- Denial of Service An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
Topics Discussed:
- How can businesses and individuals protect confidential information?
- What are some of the most common ways hackers gain unauthorized access to online data?
- What are the biggest threats to business data availability?
Assignment:
- Access the TestOut Courseware through the provided link.
- Study Section 4.3: Threats to Data, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: January 14th, 2020
Teacher Pacing Due Date: January 15th, 2020