From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Adapting to the threats

Adapting to the threats

- [Instructor] An adaptive security strategy provides a proactive approach to securing the data. In this segment, we'll discover various methods of continually monitoring network activity. Let's start by outlining the threat landscape today. Current cyber threats are complex and continue to evolve, which pose a risk to businesses, governments, and individuals. Malware is becoming more aggressive, as we are facing everything from network-based ransomware worms to devastating wiper malware. Malicious actors are designing sophisticated malware that is polymorphic in nature and alludes detection. This behavior makes it even more difficult to combat malware because the signatures are constantly changing. In addition, a large percentage of global traffic is encrypted. However, this is a two-edged sword. We know that encryption is used to protect our data from prying eyes. However, malicious actors are using encryption to…

Contents