Section 5.2: Identifying Cyber Vulnerabilities [Learning Resources]

Fundamentals of Crime Prevention by Adam J. McKee and Scott Bransford.

 

Assign This Section

Reading Assignment for Section 5.2: Identifying Cyber Vulnerabilities

Read the following subsection from our online textbook: Section 5.2: Identifying Cyber Vulnerabilities.

What You Will Learn

In this section, you will learn about common vulnerabilities in passwords and authentication methods. You’ll recognize the risks associated with unpatched software and understand the importance of regular updates. Additionally, you’ll explore social engineering tactics and discover how to protect against phishing attacks. You’ll identify vulnerabilities in network configurations and learn how to secure them, understand the risks of insufficient data encryption, and learn best practices. Finally, you’ll appreciate the importance of having formal security policies and procedures in place.

Student Learning Outcomes for Section 5.2

  • SLO 1: Identify common vulnerabilities in passwords and authentication methods.
  • SLO 2: Recognize the risks of unpatched software and the importance of updates.
  • SLO 3: Explain social engineering tactics and how to protect against phishing attacks.
  • SLO 4: Identify vulnerabilities in network configurations and describe how to secure them.
  • SLO 5: Discuss the risks of insufficient data encryption and understand best practices.
  • SLO 6: Explain the importance of formal security policies and procedures.
Modification History

File Created:  05/19/2024

Last Modified:  07/11/2024

[ Back | Contents | Next ]

Print for Personal Use

You are welcome to print a copy of pages from this Open Educational Resource (OER) book for your personal use. Please note that mass distribution, commercial use, or the creation of altered versions of the content for distribution are strictly prohibited. This permission is intended to support your individual learning needs while maintaining the integrity of the material.

 Print This Text Section

This work is licensed under an Open Educational Resource-Quality Master Source (OER-QMS) License.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Exit mobile version