O'Reilly logo

CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition by Wm. Arthur Conklin, Greg White, Dwayne Williams, Chuck Cothren, Roger Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12

Attacks and Malware

In this chapter, you will

     •   Examine the types of malware

     •   Learn about various types of computer and network attacks, including denial-of-service, spoofing, hijacking, and password guessing

     •   Understand the different types of malicious software that exist, including viruses, worms, Trojan horses, logic bombs, and time bombs

     •   Understand the various types of attacks

Attacks can be made against virtually any layer or level of software, from network protocols to applications. When an attacker finds a vulnerability in a system, he exploits the weakness to attack the system. The effect of an attack depends on the attacker’s intent and can result in a wide range of effects, from minor to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required