O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking the network

The bad guys are out there and keeping busy. Existing network technology and software is loaded with vulnerabilities yet to be found. Every time networking technology and security professionals make an improvement in the security structure of an organization or network, the bad guys are there to find new ways to violate it. It seems it will forever be a costly game of cat and mouse.

Types of attacks

Some attackers simply peruse the Internet looking for easy prey, targets of opportunity— grazing, in a sense. These attacks are referred to as browsing attacks. Whoever presents himself with vulnerabilities becomes the next victim. The attackers who commit browsing attacks are usually motivated by the thrill of the challenge and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required