Chapter 2: Know Your Enemy

The Following Comptia Security+ Exam Objectives are Covered in this Chapter:

  • 1.4 Attacks

    • 1.4.1 DOS/DDOS

    • 1.4.2 Back Door

    • 1.4.3 Spoofing

    • 1.4.4 Man in the Middle

    • 1.4.5 Replay

    • 1.4.6 TCP/IP Hijacking

    • 1.4.9 Social Engineering

    • 1.4.11 Password Guessing

      • 1.4.11.1 Brute Force

      • 1.4.11.2 Dictionary

    • 1.4.12 Software Exploitation

  • 1.5 Malicious Code

    • 1.5.1 Viruses

    • 1.5.2 Trojan Horses

    • 1.5.3 Logic Bombs

    • 1.5.4 Worms

  • 1.6 Social Engineering

  • 1.7 Auditing – Logging, system scanning

The threat of attack to your network, servers, and workstations can come from many different places. Your job is to implement and maintain measures that can help keep your systems safe from attack. There is a running battle between the people who want to attack your systems and the people who make products and services to help protect your system. Unfortunately, your network and systems is the battlefield.

In this chapter, we will look at the different types of attacks, as well as the reasons that your network is vulnerable. The vulnerabilities you must deal with are a result of the implementations of networking technologies by the operating systems manufacturers and the trusting nature of TCP/IP.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net