Links Week 1
- links
- https://en.wikipedia.org/wiki/Galileo_(spacecraft)
- -
- Malicious intent
Malicious intent refers to a deliberate and intentional desire to cause harm, damage, or injury to someone or something. It is a type of misconduct that is not driven by ignorance or laziness, but rather by a conscious decision to act in a harmful manner.
- Fake pages
- global outage
- AI usage drawbacks
- father of computing
- passwordless authentication
- Passwordless Authentication is an authentication method that allows a user to gain access to an application or IT system without entering a password or answering security questions. Instead, the user provides some other form of evidence such as a fingerprint, proximity badge, or hardware token code. Passwordless Authentication is often used in conjunction with Multi-Factor Authentication (MFA) and Single Sign-On solutions to improve the user experience, strengthen security, and reduce IT operations expense and complexity.
- Network Isolation
- Network isolation refers to the process of separating a network from the rest of the system in order to prevent and contain attacks. This involves following specific policies and procedures, identifying the type and method of attack, and determining whether a live acquisition is required.
- Telco Breach
- hospitals hit by cyber attack
- What are insider threats?
- Insider threats are cybersecurity threats that originate with authorized users, such as employees, contractors and business partners, who intentionally or accidentally misuse their legitimate access, or have their accounts hijacked by cybercriminals.
- Spacecraft launch cyberattack
- https://en.wikipedia.org/wiki/Galileo_(spacecraft)
- social media and election
- detecting spam calls
- Social network diagram
- ransomware
- can USB power charging stations be hacked
- Business as usual (business)
- Zero-day Attack
- MCMC
- type of attack
- association in charge of coordinating internet
- do we need antivirus
- airport KLIA2 hacked
- Capture the flag (cybersecurity)
- Type of cryptographic algo
- list of possible passwords