In this brief Lesson we will look at how cyberattacks are carried out. We will also consider the various groups of people who have an interest in carrying out such attacks, otherwise known as threat actors. We will then look at ways of counteracting attacks through the use of ethical testing, as well as how to cope with an attack by implementing an incident response strategy.
This Lesson is intended for anyone who has limited knowledge of IT security and wants to learn more about the topic.
We recommend taking this Lesson as part of the IT Security Fundamentals course.