Malware can be classified as follows:
- Virus (self replicates by attaching to another program or file)
- Worm (replicates independently of another program)
- Trojan Horse (masquerades as a legitimate file or program)
- Rootkit (gains privileged access to a machine while concealing itself)
- Spyware (collects information from a target system)
- Adware (delivers advertisements with or without consent)
- Bot (waits for commands from the hacker)
- Ransomware (holds a computer system or data captive until payment is received) @ciscoAcademy
- Virus (self replicates by attaching to another program or file)
- Worm (replicates independently of another program)
- Trojan Horse (masquerades as a legitimate file or program)
- Rootkit (gains privileged access to a machine while concealing itself)
- Spyware (collects information from a target system)
- Adware (delivers advertisements with or without consent)
- Bot (waits for commands from the hacker)
- Ransomware (holds a computer system or data captive until payment is received) @ciscoAcademy
2017 biggest threats,
some quotes from top managers about their view of perceived threats
"large-scale IoT security breach will occur in 2017
continued rise in popularity of connected products results in an increase in the number of back doors open to an adversary, and IoT devices will become a target for ransomware
DDoS attacks, internet shutdowns powered by cheap, insecure IoT devices will become more common
Successful attacks on IoT sensors are difficult to detect because of the limited access to the device's system state, insufficient computing power for endpoint protection software to be installed on them, and lack of security compliance standards for IoT security best practices."
#Security #2017
@ciscoAcademy
some quotes from top managers about their view of perceived threats
"large-scale IoT security breach will occur in 2017
continued rise in popularity of connected products results in an increase in the number of back doors open to an adversary, and IoT devices will become a target for ransomware
DDoS attacks, internet shutdowns powered by cheap, insecure IoT devices will become more common
Successful attacks on IoT sensors are difficult to detect because of the limited access to the device's system state, insufficient computing power for endpoint protection software to be installed on them, and lack of security compliance standards for IoT security best practices."
#Security #2017
@ciscoAcademy
❤2
"از این اسکریپت EEM برای مخفی کردن هر کانفیگی که دوست دارید استفاده کنید"
event manager applet HideMyConfig
event cli pattern "show run" sync yes
action 100 cli command "enable"
action 105 cli command "show run | excl applet|event|action|username"
action 110 puts "$_cli_result"
action 115 set _exit_status "0"
@ciscoAcademy
event manager applet HideMyConfig
event cli pattern "show run" sync yes
action 100 cli command "enable"
action 105 cli command "show run | excl applet|event|action|username"
action 110 puts "$_cli_result"
action 115 set _exit_status "0"
@ciscoAcademy
The higher the privilege level, the more router access a user has. Commands that are available at lower privilege levels are also executable at higher levels. @ciscoAcademy