Introduction to Cyber Attacks
About this Course
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.Created by: New York University

Related Online Courses
This course provides a comprehensive understanding of key accounting principles related to assets. It covers topics such as revenue recognition, bad debt expense, and various inventory methods... more
In the 21st century, computational thinking is a skill critical for all the world\'s citizens. Computing and technology is impacting all our lives and everyone needs to know how to formulate... more
Most applications need to store data in some form of database. Amazon Web Services (AWS) provides several tools to help you migrate your databases, and the applications that use them, to the cloud.... more
Dive deep into advanced jQuery techniques with this comprehensive course. Start with AJAX and JSON to integrate and retrieve data from various APIs seamlessly. Each lesson builds on the previous,... more
Take your Excel productivity to the next level by learning how to leverage the capabilities of ChatGPT, regardless of whether you are an Excel amateur or seasoned power-user. Over the span of this... more