This section introduces the topic of who the adversaries of systems and software are and also provides a review of the security basics we've covered thus far in the course. The types of adversaries can be classified into three types by varying degree of talent: - Script kiddies - Hackers (white and black hat) - Elite Other types of attackers we discuss are nation state adversaries. If you've seen "The Interview" then you'll know who we mean. We then classify the types of attacks launched by adversaries: - Non-structured - Structured - Highly-structured When assessing an attack it's important to note who and what the target of the attack is. This then helps inform what is known as the defensive coding process. Finally, we present a review of the security basics covered in previous sections.
They are responsible for knowing where a network's possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including ...