O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Access control attacks and countermeasures

There are many attacks that can be attributed to the compromise of access control systems and processes to gain unauthorized access. The following are some of the most prominent ones.

Port scanning and compromise

Backdoors are the unauthorized open ports created by malicious programs that allow an unauthorized entity to gain access into the system. An important countermeasure is to periodically check these open ports in the system and close the ports that are not used by programs. Port scanning tools will help in this process. While port scanning helps security tests to identify open ports, the scanners can also be used by attackers to find the entry points to system.

Denial-of-Service (DoS) is a type of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required