Reply To: OCU C)OST B Discussion Lesson 08
Three network vulnerabilities are weak password, malware and keyloggers. Each possesses its own distinctive threat. Each of the vulnerabilities must be addressed in specific ways to rectify.
Malware is short for malicious software. The are several types of malicious software. some types of malicious software are Trojans, viruses, ransomware, and worms. Malware is used to lock up PC’s and networks making them unusable. (The Future of Ransomware: Inside Cisco Talos Threat Hunters, 2024). It also has the capability to steal computer resources and monetize by selling company data. Ways to prevent malware attacks are to ensure all updates are completed on devices, strong authentication, and antivirus protection.
Weak passwords are often overlooked when thinking of network vulnerability. Passwords are often considered the weakest link in an organization’s network. (Specops Software, 2022). 98% of passwords include 8 characters and per a report from google 65% are often reused for different application (Specops Software, 2022). To protect your devices from this type of intrusion it is important to ensure that you are not reusing passwords, using several types of character in your password helps prevent attacks, and not using personal information in your passwords are ways to prevent hackers from accessing your passwords
Keyloggers are another vulnerability. Keylogger is short for keystroke logger. Keylogger records all keystrokes on the device being used. This gives hackers the ability to track passwords and other sensitive information. A way to combat keyloggers are using a virtual keyboard, keeping software updated, and regular security scans. (2024)
Specops Software. (2022). THE 2022 WEAK PASSWORD REPORT [Report]. https://specopssoft.com/wp-content/uploads/2022/02/Specops-Software-Weak-Password-Report-2022-2.pdf
The future of ransomware: Inside Cisco Talos threat hunters. (2024, June 18). [Video]. Cisco. https://www.cisco.com/site/in/en/learn/topics/security/what-is-malware.html#jump-anchor-1
Keyloggers explained: How to protect against keyloggers. SOPHOS. (2024, September 23). https://www.sophos.com/en-us/cybersecurity-explained/keylogger