Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)OST B Discussion Lesson 08

#98318
Latoya Stoudmire
Participant

Three network vulnerabilities are weak password, malware and keyloggers. Each possesses its own distinctive threat. Each of the vulnerabilities must be addressed in specific ways to rectify.

Malware is short for malicious software. The are several types of malicious software. some types of malicious software are Trojans, viruses, ransomware, and worms. Malware is used to lock up PC’s and networks making them unusable. (The Future of Ransomware: Inside Cisco Talos Threat Hunters, 2024). It also has the capability to steal computer resources and monetize by selling company data. Ways to prevent malware attacks are to ensure all updates are completed on devices, strong authentication, and antivirus protection.

Weak passwords are often overlooked when thinking of network vulnerability. Passwords are often considered the weakest link in an organization’s network. (Specops Software, 2022). 98% of passwords include 8 characters and per a report from google 65% are often reused for different application (Specops Software, 2022). To protect your devices from this type of intrusion it is important to ensure that you are not reusing passwords, using several types of character in your password helps prevent attacks, and not using personal information in your passwords are ways to prevent hackers from accessing your passwords

Keyloggers are another vulnerability. Keylogger is short for keystroke logger. Keylogger records all keystrokes on the device being used. This gives hackers the ability to track passwords and other sensitive information. A way to combat keyloggers are using a virtual keyboard, keeping software updated, and regular security scans. (2024)

Specops Software. (2022). THE 2022 WEAK PASSWORD REPORT [Report]. https://specopssoft.com/wp-content/uploads/2022/02/Specops-Software-Weak-Password-Report-2022-2.pdf

The future of ransomware: Inside Cisco Talos threat hunters. (2024, June 18). [Video]. Cisco. https://www.cisco.com/site/in/en/learn/topics/security/what-is-malware.html#jump-anchor-1

Keyloggers explained: How to protect against keyloggers. SOPHOS. (2024, September 23). https://www.sophos.com/en-us/cybersecurity-explained/keylogger

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.