Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security in the new era (Consumer Device Targeting Attacks…
Information
Security in the new era
Biometric Malware
can be hacked along with another module to trick the system into generating a positive authentication and gain access
attack
Template database
Inter-module communication
Matcher
Sensor breach
protect
Ultrasound
Flexibility
Electrical measurements
Measurements of light
Oximetry
Infrared images
Ransomware
attack
Exploit Kits
Malicious Email Attachments
Malicious Email Links
is a criminal business model that uses malicious software to hold valuable files, data or information for ransom
protect
Reduce the Attack Surface
Prevent Known Threats
Identify and Prevent Unknown Threats
Consistently back up data
antivirus updated
Consumer Device Targeting Attacks
is an exploit targeting handheld communications devices, such as smartphones and tablets
attack
A journey of ad-hoc connections for employees' wireless devices.
vulnerabilities
An attacker mails an iPhone with a high-capacity battery to the target organization
protect
that corporations develop mobile security policies
evaluate mobile apps before allowing them
that businesses develop a robust
AI-Powered Automated Hacking
Artificial intelligence programs can learn to evade the best defense for achieve a specific goal through pattern study
attack
they build their own artificial intelligence and machine learning tools to launch attacks.
Lanzar programas maliciosos que pueden aprender, evolucionar y cambiar su comportamiento en función de las características de la víctima y sus objetivos es verdaderamente aterrador
protect
AI could help fight
against hacking attacks
Hacktivism
attack
use denial-of-service (DoS) attacks to disrupt traffic to a particular site
Changing the code for websites -- such as government websites -- or software
Website mirroring is when hacktivists replicate a legitimate website's content, but with a slightly different URL
Geo-bombing
The use of the software RECAP
protect
be to improve your security, even at a very basic level
Configuring Routers and Firewalls to stop invalid IPs
Limit the traffic rate coming from a single host.
Advance threat intelligence services to monitor and detect online activities
vulnerabilities
uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause