Common Types Of Network Security Vulnerabilities | PurpleSec

preview_player
Показать описание
Network security vulnerabilities are constantly evolving as threat actors seek new and intuitive ways to gain access to a business’s network. In this video, I’m going to breakdown the most common types of network vulnerabilities that threaten the security of your systems in 2022.

Video Chapters
------------------------------
00:00 - Introduction
00:17 - What Is A Network Vulnerability?
01:34 - What Are The Types Of Network Vulnerabilities?
02:34 - Malware (Malicious Software)
09:12 - Social Engineering Attacks
16:16 - Outdated Or Unpatched Software
17:33 - Misconfigured Firewalls And Operating Systems
20:50 - Conclusion

About The Author
------------------------------
Jason Firch, MBA

Related Videos
-------------------------
► What Is Vulnerability Management? (Explained By Experts)
► 7 Data Loss Prevention Best Practices
► The 3 Types Of Security Controls
► Red Team VS Blue Team: What’s The Difference?
► What Is A Security Operations Center?
► What Are The Types Of Penetration Testing?
► Firewall Penetration Testing: Steps, Methods, & Tools:

Resources & Links
------------------------------
What Is A Network Vulnerability?

50 Free Information & Cyber Security Policy Templates

What Is A Network Vulnerability?

A network vulnerability is a weakness or flaw in software, hardware, or organizational processes, which when compromised by a threat, can result in a security breach.

Nonphysical network vulnerabilities typically involve software or data. For example, an operating system (OS) might be vulnerable to network attacks if it’s not updated with the latest security patches. If left unpatched a virus could infect the OS, the host that it’s located on, and potentially the entire network.

Physical network vulnerabilities involve the physical protection of an asset such as locking a server in a rack closet or securing an entry point with a turnstile.

Servers have some of the strongest physical security controls in place as they contain valuable data and trade secrets or perform a revenue-generating function like a web server hosting an eCommerce site. Often stored in off-site data centers or in secure rooms, servers should be protected with personalized access cards and biometric scanners.

Prior to investing in security controls, a vulnerability risk assessment is performed to quantify the cost and acceptable loss of the equipment and its function. As with all things in cyber security it’s a balancing act of resources vs functionality that makes for the most practical solutions.

#networksecurity #vulnerabilities #cybersecurity
Рекомендации по теме
Комментарии
Автор

👋 If you're new here, then consider subscribing to our weekly newsletter featuring the top cybersecurity minds in the industry:

PurpleSec
Автор

Thank you so much! This really helped with my revision :)

galladite
Автор

Thank you for making this video! It's exactly what I was looking for.

jayneengelgau
Автор

Please boost the volume up in future videos. Thanks!

TheodoreRavindranath
Автор

Really good presentation! Thanks for sharing

RM-gmlu
Автор

Awesome content & explanation, on you tube, Thanks sir, Keep it up

rohan
Автор

Very clear and concise information, very helpful thanks

chrisuk
Автор

at 19:42 he should say "The longer a password is USED ..."

simonwalker
Автор

Thank you for posting this - it's a great video! Well laid out and explained. I would love to use this in my Intro to Computers class, but it's a little too long all on its own. For layout reasons, it would be great to be able to cut out each section to embed it in the course. But YouTube only allows an extraction of a minute of video at a time and our LMS won't render the HTML code with a start and stop time correctly : ( I could just give them the time stamps to start and stop at but these are people just learning how to use computers so I'm really trying to keep it simple. Any recommendations? I could just screen record the sections and cite you with the entire video link beneath the clip, but I would like your permission before doing that (if there's not a better way)!
-
I also had a question about Phishing vs. Spear Phishing. Does Phishing become Spear Phishing because the email was only sent to Amy in your example or because she actually has a Bank of America account or both?
Thanks again!

jacquelinemacdonald
Автор

what are the skills needed to be a blue teamer ? i want to start from the scratch i dont know where to start ? please help

CS-wiff
Автор

Vulnerabilities meant weakpoints and attackers can exploit them so attack types are malwares spoofing ddos social engineering

Are we taking those attacks also as vulnerabilities

Please someone explain me
It means a lot🙏❤️.

Vamos_c
Автор

Good content but slow down. You talk too fast

beverlysantarelli