Sie sind auf Seite 1von 3

Vulnerabilities and attacks

o 1.1Backdoor

o 1.2Denial-of-service attack

o 1.3Direct-access attacks

o 1.4Eavesdropping

o 1.5Spoofing

o 1.6Tampering

o 1.7Privilege escalation

o 1.8Phishing

o 1.9Clickjacking

o 1.10Social engineering

2Systems at risk

o 2.1Financial systems

o 2.2Utilities and industrial equipment

o 2.3Aviation

o 2.4Consumer devices

o 2.5Large corporations

o 2.6Automobiles

o 2.7Government

o 2.8Internet of things and physical vulnerabilities

2.8.1Medical systems

3Impact of security breaches

4Attacker motivation

5Computer protection (countermeasures)

o 5.1Security by design
o 5.2Security architecture

o 5.3Security measures

o 5.4Vulnerability management

o 5.5Reducing vulnerabilities

o 5.6Hardware protection mechanisms

o 5.7Secure operating systems

o 5.8Secure coding

o 5.9Capabilities and access control lists

o 5.10Response to breaches

6Notable attacks and breaches

o 6.1Robert Morris and the first computer worm

o 6.2Rome Laboratory

o 6.3TJX customer credit card details

o 6.4Stuxnet attack

o 6.5Global surveillance disclosures

o 6.6Target and Home Depot breaches

o 6.7Office of Personnel Management data breach

o 6.8Ashley Madison breach

7Legal issues and global regulation

8Role of government

9International actions

o 9.1Europe

10National actions

o 10.1Computer emergency response teams

o 10.2Canada

o 10.3China
o 10.4Germany

o 10.5India

o 10.6Pakistan

o 10.7South Korea

o 10.8United States

10.8.1Legislation

10.8.2Agencies

10.8.3Computer emergency readiness team

11Modern warfare

12Job market

13Terminology

14Scholars

15See also

16References

17Further reading

18External links

Das könnte Ihnen auch gefallen