Network Attack Taxonomy
This section provides an overview of various network attacks and effects.
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Professional attackers, company competitors, or even internal employees can violate all routers, switches, and hosts. In fact, according to several studies, more than half of all network attacks are waged internally.
The Computer Security Institute (CSI) in San Francisco estimates that between 60 and 80 percent of network misuse comes from inside the enterprises in which the misuse has taken place. Cisco Systems Posture Assessment Group reports that the inside network is 100 percent vulnerable to attack. To determine the best ways to protect ...
Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.