O'Reilly logo

CompTIA Security+ All-in-One Exam Guide (Exam SY0-401), 4th Edition by Greg White, Wm. Arthur Conklin, Chuck Cothren, Roger Davis, Dwayne Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 14

Application and Wireless Attacks

In this chapter, you will

     •   Explain types of wireless attacks

     •   Explain types of application attacks

Attacks exploit vulnerabilities in systems to enable an attacker to obtain access to the system. Two common modes of attacks are via the wireless network, using the ability to connect without a physical connection to stealthily launch attacks, and via the applications being run in the system. Applications represent an avenue to attack because they typically have more vulnerabilities than a modern patched operating system.

Wireless Attacks

As wireless use increases, the security of the wireless protocols has become a more important factor in the security of the entire network. As a security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required