Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This section introduces the topic of who the adversaries of systems and software are and also provides a review of the security basics we've covered thus far in the course. The types of adversaries can be classified into three types by varying degree of talent: - Script kiddies - Hackers (white and black hat) - Elite Other types of attackers we discuss are nation state adversaries. If you've seen "The Interview" then you'll know who we mean. We then classify the types of attacks launched by adversaries: - Non-structured - Structured - Highly-structured When assessing an attack it's important to note who and what the target of the attack is. This then helps inform what is known as the defensive coding process. Finally, we present a review of the security basics covered in previous sections.