From the course: IT Security Foundations: Core Concepts

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Exploiting the unknown

Exploiting the unknown

- [Instructor] A zero-day attack occurs when a malicious actor takes advantage of a flaw in software that is either unknown or undisclosed by the vendor. In this segment, we'll discuss how a zero-day attack can occur and methods to prevent this type of threat. Every day, we face a constant barrage of attacks. There are many things that we can do to protect our systems. However, to stop possible malicious activity, we must first be able to identify a threat. Let's take a look at the many attacks that occur every day. I'm at this website, Kaspersky Cyberthreat Real-Time Map. And you can take a look around and scroll down, and I'm going to go to Statistics. And here, we can see detections per second. And I'll scroll down. It shows most infected today and also historical statistics worldwide. Now, in order to protect our systems, antimalware and endpoint protection will monitor the system for possible threats. Malware…

Contents