Understanding Attack Surfaces and Vectors
📖 Scenario: You are a cybersecurity analyst helping a small company understand how attackers might try to break into their systems. You will create a simple list of possible entry points and categorize them to better protect the company.
🎯 Goal: Build a categorized list of attack surfaces and their corresponding attack vectors to understand where and how attackers can try to gain access.
📋 What You'll Learn
Create a dictionary called
attack_surfaces with three keys: 'Network', 'Software', and 'Physical'.Each key should map to a list of exactly three specific attack vectors as strings.
Create a variable called
minimum_vectors and set it to the number 2.Use a dictionary comprehension to create a new dictionary called
filtered_surfaces that only includes attack surfaces with at least minimum_vectors attack vectors.Add a final key-value pair to
attack_surfaces with key 'Human' and a list of three attack vectors.💡 Why This Matters
🌍 Real World
Understanding attack surfaces and vectors helps organizations identify where they are vulnerable to cyber attacks and prioritize their security efforts.
💼 Career
Cybersecurity professionals use this knowledge to design defenses, conduct risk assessments, and educate employees about potential threats.
Progress0 / 4 steps