Attacking the network
The bad guys are out there and keeping busy. Existing network technology and software is loaded with vulnerabilities yet to be found. Every time networking technology and security professionals make an improvement in the security structure of an organization or network, the bad guys are there to find new ways to violate it. It seems it will forever be a costly game of cat and mouse.
Types of attacks
Some attackers simply peruse the Internet looking for easy prey, targets of opportunity— grazing, in a sense. These attacks are referred to as browsing attacks. Whoever presents himself with vulnerabilities becomes the next victim. The attackers who commit browsing attacks are usually motivated by the thrill of the challenge and ...
Get CISSP Training Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.