|
|
1.4 Attacks
1.4.1 DOS/DDOS
1.4.2 Back Door
1.4.3 Spoofing
1.4.4 Man in the Middle
1.4.5 Replay
1.4.6 TCP/IP Hijacking
1.4.9 Social Engineering
1.4.11 Password Guessing
1.4.11.1 Brute Force
1.4.11.2 Dictionary
1.4.12 Software Exploitation
1.5 Malicious Code
1.5.1 Viruses
1.5.2 Trojan Horses
1.5.3 Logic Bombs
1.5.4 Worms
1.6 Social Engineering
1.7 Auditing – Logging, system scanning
The threat of attack to your network, servers, and workstations can come from many different places. Your job is to implement and maintain measures that can help keep your systems safe from attack. There is a running battle between the people who want to attack your systems and the people who make products and services to help protect your system. Unfortunately, your network and systems is the battlefield.
In this chapter, we will look at the different types of attacks, as well as the reasons that your network is vulnerable. The vulnerabilities you must deal with are a result of the implementations of networking technologies by the operating systems manufacturers and the trusting nature of TCP/IP.
|
|