Attacks are possible at many levels, from network protocols to applications. The effects of an attack can vary from minor to severe. In this chapter, you will learn about the steps that an attacker can take. By understanding these steps, you can better limit the exposure of your system. Many attacks exploit known vulnerabilities for which there are patches.
- 1.
Identify the different types of malware that exist.
- 2.
Describe computer attacks.