Did I Do That
Public Internet Threats

Who
Protocol
Network Configurations
100

When this flaw exists , obsolete routers, switches, or servers aren’t able to use the most recent security updates.

Obsolete & Unpatched Network Resources

100

These threats  can disable machines or entire computer systems by overloading them with traffic.

Denial of service (DoS) and distributed denial of service (DDoS) attacks

100

Blank is the cause of  85% of of all data breaches

employees/humans

100

This internet communication protocol that isn’t inherently secure.

HTTP

Hypertext Transfer Protocol

100

Although these are designed to protect employee computing sessions and  data, like IP addresses and passwords, from prying eyes., they don’t always achieve that goal

Employee VPN Usage

200

This weakness involves using default or factory configurations on hardware and software and failing to segment networks, set access controls on your applications, or patch immediately.

Network Misconfigurations

200

This code/software is designed to disturb normal or safe computing operations.

Malicious software

200

This is a technique used by threat actors to trick users into opening emails and clicking links inside them.

Email phishing

200

This Potocol allows users to use one computer to interface with another remote computer and control it.

Remote Desktop Protocol (RDP)

200

If this is unprotected it can allow thieves to steal credentials and log into business applications from coffee shops and other public locations

Wi-Fi Networks

M
e
n
u