CHAPTER 14
Attacks exploit vulnerabilities in systems to enable an attacker to obtain access to the system. Two common modes of attacks are via the wireless network, using the ability to connect without a physical connection to stealthily launch attacks, and via the applications being run in the system. Applications represent an avenue to attack because they typically have more vulnerabilities than a modern patched operating system.
Wireless Attacks
As wireless use increases, the security of the wireless protocols has become a more important factor in the security of the entire network. As a security ...
Get CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401), 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.