From the course: IT Security Foundations: Core Concepts
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Exploiting the unknown
From the course: IT Security Foundations: Core Concepts
Exploiting the unknown
- [Instructor] A zero-day attack occurs when a malicious actor takes advantage of a flaw in software that is either unknown or undisclosed by the vendor. In this segment, we'll discuss how a zero-day attack can occur and methods to prevent this type of threat. Every day, we face a constant barrage of attacks. There are many things that we can do to protect our systems. However, to stop possible malicious activity, we must first be able to identify a threat. Let's take a look at the many attacks that occur every day. I'm at this website, Kaspersky Cyberthreat Real-Time Map. And you can take a look around and scroll down, and I'm going to go to Statistics. And here, we can see detections per second. And I'll scroll down. It shows most infected today and also historical statistics worldwide. Now, in order to protect our systems, antimalware and endpoint protection will monitor the system for possible threats. Malware…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.