2 hours 13 minutes
Welcome to the Palo Alto Networks Academy Secure Business Systems Administration presentation on cyber threats and attacks and threat agent profiles.
Let's begin with the definition of a cyber threat as the possibility of a malicious attempt to damage or disrupt a network or system.
The term cyber typically means in association with one or more systems that are interconnected or which participate on the Internet.
In the modern workplace and foremost home devices as well. The vast majority of the endpoints participate on the Internet.
Thus they exist in cyberspace on one or more levels, either directly or by connection through another device that directly participates in cyberspace.
So threats are present as all of these systems and devices have vulnerabilities, and they are vulnerable when they are interconnected.
So cyber threats can also significantly impacted business operations in many ways
an attack e that can be highway damaging to a company's reputation.
Cyber attacks also commonly target business products, intellectual property and databases,
and an advanced threat can even result in the attacker gaining control over critical business systems such as communications and finance.
In all of these instances, it's critically important that businesses have policies and procedures in place
for both private and publicly responding to a threat. He that
in cybersecurity terms a threat is the possibility of an attack. Threats exist. As devices have vulnerabilities. An attack is an actual attempt to exploit the vulnerability.
So one vulnerability that always exists is social engineering.
Social engineering attacks can yield both information and intelligence that can be used to exploit the human and business tendencies and practices.
Especially damaging are the sophisticated email and adware attacks that entice and users to perform actions that further trigger or propagate the attack.
Businesses need to understand that the perpetrators of these attacks are criminals who are highly experienced, organized and well financed. While we think of criminals as actors who are interested in financial gain, cyber Attackers, maybe even sponsored by nation states and maybe more focused on disruption and destruction,
cyber terrorists may function in similar ways as nation state Attackers. And they may also be interested in compromising business device systems for their own interests, including advanced cyber threat communications and even launching botnet attacks
during election times and other politically charged moments. Hacktivists can threaten and even take over business systems as they seek to watch modification attacks that can promote their organizational messages.
Activists may also conduct denial of service attacks and more commonly distributed denial of service attacks, which can interrupt or prevent a business from maintaining their Internet point of presence
When keeping all of these aforementioned threats and threat agents in mind, Focusing solely on perimeter based defenses is a critical cybersecurity defense mistake
via social engineering, introduction of personal phones and devices and MAWR risk elements that end users and endpoints present. It's critical to remember that effective cybersecurity cannot be obtained by simply monitoring or filtering communications at the business network perimeter.
Palo Alto Secure Business Systems Administration Module 2 Quiz
Getting Started with Palo Alto Networks
In this course brought to you by Palo Alto Networks, you will learn how to ...
Certificate of Completion Offered
Cloud Architecture Foundations
In this Cloud Architecture training, students learn the basics of cloud computing across three platforms ...
8 CEU/CPE Hours Available
Certificate of Completion Offered