This lecture will briefly describe some common attacks, vulnerabilities and their relation.
Download here
Recommended reading
- Segurança em Redes Informáticas, A. Zúquete: Caps. 4 & 5
- Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
- Examining the costs and causes of cyber incident, Sasha Romanosky, Journal of Cybersecurity, Volume 2, Issue 2, December 2016, Pages 121–135
- Masoudeh Keshavarzi, Hamid Reza Ghaffary, I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion, Computer Science Review, Volume 36, 2020, 100233, ISSN 1574-0137
- CVE Details Statistics