3.2 Analyze and differentiate among types of attacks
Any computer system connected to any type of network is subject to various methods of attack. The rate at which networked systems are attacked is increasing at an alarming rate. Systems that aren’t even connected to the Internet, but just to a private network, may come under attack. There are myriad ways to attack a computer system. Your familiarity with a modest collection of these attacks and how to respond to them is an essential skill for the Security+ exam. The following section discusses common attack methods.
A man-in-the-middle attack is a communications eavesdropping attack. Attackers position themselves in the communication stream between a client and server (or ...