Common Types Of Network Security Vulnerabilities | PurpleSec

  Рет қаралды 45,665

PurpleSec

PurpleSec

Күн бұрын

Network security vulnerabilities are constantly evolving as threat actors seek new and intuitive ways to gain access to a business’s network. In this video, I’m going to breakdown the most common types of network vulnerabilities that threaten the security of your systems in 2022.
Video Chapters
------------------------------
00:00 - Introduction
00:17 - What Is A Network Vulnerability?
01:34 - What Are The Types Of Network Vulnerabilities?
02:34 - Malware (Malicious Software)
09:12 - Social Engineering Attacks
16:16 - Outdated Or Unpatched Software
17:33 - Misconfigured Firewalls And Operating Systems
20:50 - Conclusion
About The Author
------------------------------
Jason Firch, MBA
purplesec.us/cyber-security-e...
Related Videos
-------------------------
► What Is Vulnerability Management? (Explained By Experts)
• What Is Vulnerability ...
► 7 Data Loss Prevention Best Practices
• 7 Data Loss Prevention...
► The 3 Types Of Security Controls
• The 3 Types Of Securit...
► Red Team VS Blue Team: What’s The Difference?
• Red Team VS Blue Team:...
► What Is A Security Operations Center?
• What Is A Security Ope...
► What Are The Types Of Penetration Testing?
• What Are The Types Of ...
► Firewall Penetration Testing: Steps, Methods, & Tools:
• Firewall Penetration T...
Resources & Links
------------------------------
What Is A Network Vulnerability?
purplesec.us/network-vulnerab...
50 Free Information & Cyber Security Policy Templates
purplesec.us/resources/cyber-...
What Is A Network Vulnerability?
A network vulnerability is a weakness or flaw in software, hardware, or organizational processes, which when compromised by a threat, can result in a security breach.
Nonphysical network vulnerabilities typically involve software or data. For example, an operating system (OS) might be vulnerable to network attacks if it’s not updated with the latest security patches. If left unpatched a virus could infect the OS, the host that it’s located on, and potentially the entire network.
Physical network vulnerabilities involve the physical protection of an asset such as locking a server in a rack closet or securing an entry point with a turnstile.
Servers have some of the strongest physical security controls in place as they contain valuable data and trade secrets or perform a revenue-generating function like a web server hosting an eCommerce site. Often stored in off-site data centers or in secure rooms, servers should be protected with personalized access cards and biometric scanners.
Prior to investing in security controls, a vulnerability risk assessment is performed to quantify the cost and acceptable loss of the equipment and its function. As with all things in cyber security it’s a balancing act of resources vs functionality that makes for the most practical solutions.
► If you need help securing your business from cyber attacks then feel free to check out: purplesec.us
► Follow us on Twitter: / purple_sec
► Find us on Pinterest: / purple_sec
#networksecurity #vulnerabilities #cybersecurity

Пікірлер: 41
@PurpleSec
@PurpleSec 3 жыл бұрын
👋 If you're new here, then consider subscribing to our weekly newsletter featuring the top cybersecurity minds in the industry: www.linkedin.com/newsletters/ai-cybersecurity-insights-7058517055238504448/
@chatsifieds
@chatsifieds 2 ай бұрын
good lesson, thank you
@jayneengelgau8452
@jayneengelgau8452 6 ай бұрын
Thank you for making this video! It's exactly what I was looking for.
@PurpleSec
@PurpleSec 6 ай бұрын
Glad you found this to be valuable’
@galladite4924
@galladite4924 3 жыл бұрын
Thank you so much! This really helped with my revision :)
@PurpleSec
@PurpleSec 3 жыл бұрын
Glad to hear this was useful!
@TheodoreRavindranath
@TheodoreRavindranath 3 жыл бұрын
Please boost the volume up in future videos. Thanks!
@PurpleSec
@PurpleSec 3 жыл бұрын
Will do. Appreciate the feedback! - Jason
@jmcybersecurity
@jmcybersecurity Жыл бұрын
Very well laid out. Interesting.
@PurpleSec
@PurpleSec Жыл бұрын
Glad you enjoyed it! - Jason
@RM-gm7lu
@RM-gm7lu 2 жыл бұрын
Really good presentation! Thanks for sharing
@PurpleSec
@PurpleSec 2 жыл бұрын
Thrilled to hear this was useful for you! - Jason
@chrisuk1000
@chrisuk1000 2 жыл бұрын
Very clear and concise information, very helpful thanks
@PurpleSec
@PurpleSec 2 жыл бұрын
Glad this was useful for you! - Jason
@CarolinaCowgirl951
@CarolinaCowgirl951 Жыл бұрын
This is very helpful; thank you!
@PurpleSec
@PurpleSec Жыл бұрын
Glad you found value in this! - Jason
@biyafaysalfaisal6635
@biyafaysalfaisal6635 3 жыл бұрын
Very Informative video
@PurpleSec
@PurpleSec 3 жыл бұрын
Thrilled to hear this was a valuable resource! - Jason
@rohan8758
@rohan8758 2 жыл бұрын
Awesome content & explanation, on you tube , Thanks sir, Keep it up
@PurpleSec
@PurpleSec 2 жыл бұрын
Really do appreciate the feedback. More to come soon! Let us know if there are any topics you’d like us to focus on in the future. - Jason
@rohan8758
@rohan8758 2 жыл бұрын
Sure sir
@llereoj_Seralom
@llereoj_Seralom 3 жыл бұрын
salamat bro
@PurpleSec
@PurpleSec 3 жыл бұрын
Glad this was helpful! - Jason
@jacquelinemacdonald2036
@jacquelinemacdonald2036 2 жыл бұрын
Thank you for posting this - it's a great video! Well laid out and explained. I would love to use this in my Intro to Computers class, but it's a little too long all on its own. For layout reasons, it would be great to be able to cut out each section to embed it in the course. But KZbin only allows an extraction of a minute of video at a time and our LMS won't render the HTML code with a start and stop time correctly : ( I could just give them the time stamps to start and stop at but these are people just learning how to use computers so I'm really trying to keep it simple. Any recommendations? I could just screen record the sections and cite you with the entire video link beneath the clip, but I would like your permission before doing that (if there's not a better way)! - I also had a question about Phishing vs. Spear Phishing. Does Phishing become Spear Phishing because the email was only sent to Amy in your example or because she actually has a Bank of America account or both? Thanks again!
@PurpleSec
@PurpleSec 2 жыл бұрын
Hey Jacqueline! Shoot me an email with this request. I have the slides available as well and we can get your class set up! Jason@purplesec.us Thanks! -Jason
@simonwalker8170
@simonwalker8170 Жыл бұрын
at 19:42 he should say "The longer a password is USED ..."
@CS-wi3ff
@CS-wi3ff 3 жыл бұрын
what are the skills needed to be a blue teamer ? i want to start from the scratch i dont know where to start ? please help
@PurpleSec
@PurpleSec 3 жыл бұрын
Start reading books and consuming KZbin videos. I would also recommend getting familiar with Linux and the command console. Be familiar with PowerShell and Python as well. In terms of certifications, the Certified Enterprise Defender (GCED) is solid. Wish you the best of luck! - Jason
@CS-wi3ff
@CS-wi3ff 3 жыл бұрын
@@PurpleSec thank you brother
@PurpleSec
@PurpleSec 3 жыл бұрын
@@CS-wi3ff anytime! - Jason
@Vamos_c
@Vamos_c 3 ай бұрын
Vulnerabilities meant weakpoints and attackers can exploit them so attack types are malwares spoofing ddos social engineering Are we taking those attacks also as vulnerabilities Please someone explain me It means a lot🙏❤️.
@sanarizwan5174
@sanarizwan5174 Ай бұрын
Attacks and threats are actions to compromise the weaknesses or flaws in any system. Those flaws or weaknesses are the Vulnerabilities, I am at a beginner's level but this is my understanding. I hope it help
@beverlysantarelli650
@beverlysantarelli650 3 жыл бұрын
Good content but slow down. You talk too fast
@PurpleSec
@PurpleSec 3 жыл бұрын
Appreciate the feedback, Beverly! - Jason
@margaretschachte489
@margaretschachte489 3 жыл бұрын
That's funny, I literally just set the video to 1.25x speed because it was too slow. Just shows that everyone absorbs information differently!
@PurpleSec
@PurpleSec 3 жыл бұрын
@@margaretschachte489 I like looking at it that way vs assuming "everyone's a critic" :) - Jason
What Are The Types Of Penetration Testing? | PurpleSec
17:14
PurpleSec
Рет қаралды 18 М.
Survive 100 Days In Nuclear Bunker, Win $500,000
32:21
MrBeast
Рет қаралды 114 МЛН
IQ Level: 10000
00:10
Younes Zarou
Рет қаралды 12 МЛН
Fast and Furious: New Zealand 🚗
00:29
How Ridiculous
Рет қаралды 45 МЛН
Denial of Service Attacks Explained
9:52
IBM Technology
Рет қаралды 55 М.
The 3 Types Of Security Controls (Expert Explains) | PurpleSec
20:19
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Internet Networks & Network Security | Google Cybersecurity Certificate
1:09:05
Google Career Certificates
Рет қаралды 143 М.
Network Ports Explained
10:33
PowerCert Animated Videos
Рет қаралды 1,6 МЛН
Cyber Security Project: Vulnerability Management
17:54
Cyber Salih
Рет қаралды 14 М.
Tag him😳💕 #miniphone #iphone #samsung #smartphone #fy
0:11
Pockify™
Рет қаралды 4,7 МЛН
Запрещенный Гаджет для Авто с aliexpress 2
0:50
Тимур Сидельников
Рет қаралды 1,1 МЛН
Лучший браузер!
0:27
Honey Montana
Рет қаралды 1,1 МЛН
разбил телефон из-за видео
0:15
STANISLAVSKIY Hi
Рет қаралды 727 М.