Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Social Engineering and other attacks This lesson covers social engineering. This exploits weakness in people which allows attackers to find vulnerabilities. There has to be mandatory user training so employees know policies on things such as leaving a computer unlocked, giving out passwords or opening doors for unknown people. Other forms of attacks are viruses, worms, and buffer overflow. Companies and install anti-malware on computers to mitigate viruses as well as implementing user policies such as do not use unknown devices such as a USB just found on the floor. Worms are dangerous to networks because they can replicate quickly and take down a network by performing a constant denial of service. A buffer overflow is a vulnerability in a program that can write more program than can fit into a program so instead of fault finding, there is an overwriting after a buffer than can cause a crash.