Lecture

Cybersecurity: Vulnerabilities and Exploits

Description

This lecture covers the motivation, means, and attacks used by nation agents in cybersecurity, the definition of vulnerabilities and their exploitation, the process from vulnerability discovery to patch deployment, the Zerodium payout for various exploits, sectors of vulnerabilities in ICT, network attack surfaces, DNS poisoning, SQL injection, ransomware attacks, and the CWE Top 25-2020. It also discusses phishing attacks during crises like Covid-19, the human attack surface, and the Social-Engineer Toolkit for social engineering attacks.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.