Chapter 2
Common Threats, Attacks, and Vulnerabilities
This chapter covers the following topics:
Malware Variants: This section explores the most common types of malware that you need to be aware of.
IoT Vulnerabilities: This section familiarizes you with some of the most common vulnerabilities associated with IoT devices.
Distributed Denial of Service: This section introduces a very common worldwide threat known as DDoS.
On-Path Attacks: This section explains what an on-path attack is and provides a few examples.
Insider Threats: This section explores what an insider threat is and what motivates insiders to act the way they do.
Social Engineering Tactics: This section dives into the multitude of social engineering attacks that exist.
Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.