Lecture

Cybersecurity: Vulnerabilities and Exploits

Description

This lecture covers the motivation, means, and attacks used by nation agents in cybersecurity, the definition of vulnerabilities and their exploitation, the process from vulnerability discovery to patch deployment, the Zerodium payout for various exploits, sectors of vulnerabilities in ICT, network attack surfaces, DNS poisoning, SQL injection, ransomware attacks, and the CWE Top 25-2020. It also discusses phishing attacks during crises like Covid-19, the human attack surface, and the Social-Engineer Toolkit for social engineering attacks.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (43)
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Legacy Web Hosting Services Tour
Covers a tour of legacy web hosting services and discussions on future services storage.
Online Tracking: Stateful vs. Stateless Methods
Explores online tracking methods, including canvas and AudioContext API fingerprinting, and their privacy implications.
IT Security Challenges
Explores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Gitlab Agent for Kubernetes (`agentk`)
Covers the setup of a Gitlab agent for Kubernetes, focusing on installation, version control, and troubleshooting.
Show more