From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Understanding network threats and attacks

Understanding network threats and attacks

- [Instructor] Let's discuss the different types of network cyber threats and attacks, and also cover some of the common tools used to identify and prevent those threats. There are many different types of threats that are present nowadays, you know, against most organizations, whether you're a small business, a medium enterprise, a large enterprise, a government institution, and so on, right? Everybody's a target nowadays. Now, I'm going to go over some of the most common types of threats and attacks, and starting with something very simple which is spoofing. And a spoofing attack is whenever the attacker tries to gain access to a target system using a falsified identity. In many cases, that can be spoofing an IP address, a MAC address, usernames, system names, wireless networks, SSIDs, or, you know, the network IDs, email addresses, and many, many, many other types of logical identification. Then the other threat, which is still very popular nowadays and we covered earlier in the…

Contents