19.3. Recognizing Common Attacks

Most attacks are designed to exploit potential weaknesses. Those weaknesses can be in the implementation of programs or in the protocols used in networks. Many types of attacks require a high level of sophistication and are rare. You need to know about them so that you can identify what has happened in your network.

In this section, we'll look at these attacks more closely.

19.3.1. Back Door Attacks

The term back door attack can have two meanings. The original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside ...

Get CompTIA A+® Complete Deluxe Study Guide:Exams 220-701 (Essentials) and 220-702 (Practical Application) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.