SLIDE 1
Topics We’ve Covered
- Ethics
- XSS
- CSRF
- SQL injection
- Passwords
- Command injection
- Scanning
- Malware
Security Psychology Topics Weve Covered Ethics XSS CSRF SQL - - PowerPoint PPT Presentation
Security Psychology Topics Weve Covered Ethics XSS CSRF SQL injection Passwords Command injection Scanning Malware Most of these attacks are enabled by social engineering. Todays Class Pretexting
represent 96% of all security breaches involving social attacks
Breach Targets Compromised Data
access to a system
money
SSN.
access to the bus system
released from prison for wire fraud):
pretending to be HP board members
Patrician Dunn and other involved
access to individual credentials to a system
Click Through Rate
social media logins, etc.
recognize