Hello All
Welcome back to the Security Operations - series Part 4
Please go through the below links for the past post's on the same topics for review back.
https://cloudmonkeys20.blogspot.com/2023/01/security-operation-series-part-1.html
https://cloudmonkeys20.blogspot.com/2023/01/security-operation-series-part-2.html
https://cloudmonkeys20.blogspot.com/2023/01/security-operation-series-part-3.html
This series, we are going to cover, five types core threats in security operations
- Malware
- URL's
- Files
- Phishing
- SPAM
Type of Malware : Spyware, Worms, Trojans, Ransomware , Virus, are belongs to malware family
Types of URL's : URL's containing that your identity click ,which ask for credential on bank, personal accounts
Types of Files : Contains Virus, Trojans, to destroy the PC contents
SPAM / Phishing : Mainly on emails for spoofing and phishing attacks
Level of Cyber security Attacks
There are three level of attacks in cyber security
- Level one Attack : Personal attack on yourself or your family , phishing , spamming, spoofing
- Level two Attacks : Attacks on companies, institutions, and infrastructure, to destroy the company records, or steal the company information and demand for money
- Level Three Attacks : Attacks on national governments
Comments
Post a Comment