Security Operations - Part 4

 Hello All

Welcome back to the Security Operations - series Part 4 

Please go through the below links for the past post's on the same topics for review back.

https://cloudmonkeys20.blogspot.com/2023/01/security-operation-series-part-1.html

https://cloudmonkeys20.blogspot.com/2023/01/security-operation-series-part-2.html

https://cloudmonkeys20.blogspot.com/2023/01/security-operation-series-part-3.html

This series, we are going to cover, five types core threats in security operations

  • Malware
  • URL's
  • Files
  • Phishing
  • SPAM

Type of Malware : Spyware, Worms, Trojans, Ransomware , Virus, are belongs to malware family

Types of URL's : URL's containing that your identity click ,which ask for credential on bank, personal accounts

Types of Files : Contains  Virus, Trojans, to destroy the PC contents

SPAM / Phishing : Mainly on emails for spoofing and phishing attacks

Level of Cyber security Attacks

There are three level of attacks in cyber security 

  • Level one Attack : Personal attack on yourself or your family , phishing , spamming, spoofing 
  • Level two Attacks : Attacks on companies, institutions, and infrastructure, to destroy the company records, or steal the company information and demand for money
  • Level Three Attacks : Attacks on national governments 


Comments