Chapter 5: Identifying Attack Methods

As an up-and-coming cybersecurity professional, it's important to understand different attack methods that are performed by threat actors such as hackers and cyber criminals. Each type of threat actor has their own motive and intent when performing a cyberattack on a target. Having a clear understanding of the characteristics of these attack types will help you identify various types of attacks as they happen on a network.

Throughout this chapter, you will learn about the most popular types of cyberattacks performed by hackers. You will also discover how threat actors take advantage of various network protocols to launch Denial of Service (DoS) attacks, as well as how they exploit security flaws within ...

Get Cisco Certified CyberOps Associate 200-201 Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.