
Cyberwarfare
5 Live Science Podcast
00:00
How to Protect Your System From Social Engineering Attacks
There's something called theside kiel chain which is a step by step approach that people will take when they're doing a planned attack. The first thing to do is a little bit of reconnaissance, like you would do in any other operation, so i can get a good idea of what i'm goi to try an attack. Next step is trying to gain entry. If it has worked, i can move on. And that's where we start looking for vulnerabilities in the system. Most often, these vulnerabilities come in the form of bugs in the code - pieces of soft wat that aren't working quite as they're supposed to. There's data basis of thousands and thousands of known vulnerabilities
Transcript
Play full episode