New Training: Implementing Controls to Mitigate Attacks and Software Vulnerabilities
In this 4-video skill, CBT Nuggets trainer John Munjoma discusses vulnerability controls. Watch this new CompTIA training.
Watch the full course: CompTIA Cybersecurity Analyst
This training includes:
- 4 videos
- 20 minutes of training
You’ll learn these topics in this skill:
- Implementing Vulnerability Controls
- Man in the Middle Attack
- Attack Types
- Mitigating Attacks and Software Vulnerabilities
What is a Man in the Middle Attack?
Unlike highly visible and publicized ransomware and phishing attacks, MITM attacks often get little fanfare in the public space, yet they remain a very serious threat by definition. A MITM attack occurs when the attacker positions themselves between a user and their desired destination (a site, saas application or other network resource) to either silently intercept data or impersonate a trusted resource to get further access to the network. MITM perpetrators have countless ways to achieve their goals :
- Fake website to trick users into providing legitimate credentials.
- Fake wi-fi spots in public locations to snoop on network traffic.
- Snooping on email, chat or other forms of web communication.
There is no one solution to preventing MITM attacks, prevention should be part of a cohesive security strategy rather than just a suite of tools. Some of the ways organizations can prevent MITM attacks is to start by implementing strong password policies, enable MFA, prevent the use of open WI-FI or unsecured networks, enforce secure browsing by verifying SSL/TLS in websites being visited.