Locate and listen to at least three different podcasts concerning the security field
Topic 2 DQ 1
Many security vendors and researchers now post regular online podcasts about security. Locate and listen to at least three different podcasts concerning the security field. Give a brief summary of each podcast. What did you learn? Would you consider this author again in the future? Why or why not? Would you recommend them to another student?
Topic 2 DQ 2
Attackers are always searching for new attack vectors and vulnerabilities. Most of these attacks target computing systems to gain access to information. In recent years, a new type of cybercriminal focuses on monetary gain. Ransomware is one type of monetary gain tool used by cybercriminals. Identify at least three attacks that are current. What did they do? Were they successful? How were they spread? Would you recommend a client to pay the ransom or not? How can you protect yourself from this type of attack?