Chapter 2

Common Threats, Attacks, and Vulnerabilities

This chapter covers the following topics:

  • Malware Variants: This section explores the most common types of malware that you need to be aware of.

  • IoT Vulnerabilities: This section familiarizes you with some of the most common vulnerabilities associated with IoT devices.

  • Distributed Denial of Service: This section introduces a very common worldwide threat known as DDoS.

  • On-Path Attacks: This section explains what an on-path attack is and provides a few examples.

  • Insider Threats: This section explores what an insider threat is and what motivates insiders to act the way they do.

  • Social Engineering Tactics: This section dives into the multitude of social engineering attacks that exist.

  • Physical ...

Get Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.