5 Live Science Podcast cover image

Cyberwarfare

5 Live Science Podcast

00:00

How to Protect Your System From Social Engineering Attacks

There's something called theside kiel chain which is a step by step approach that people will take when they're doing a planned attack. The first thing to do is a little bit of reconnaissance, like you would do in any other operation, so i can get a good idea of what i'm goi to try an attack. Next step is trying to gain entry. If it has worked, i can move on. And that's where we start looking for vulnerabilities in the system. Most often, these vulnerabilities come in the form of bugs in the code - pieces of soft wat that aren't working quite as they're supposed to. There's data basis of thousands and thousands of known vulnerabilities

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app