Chapter 3. Threats

Terms you'll need to understand:

  • Script kiddies

  • Reconnaissance

  • Ping sweep

  • Port scan

  • Target discovery

  • Eavesdropping

  • Packet sniffer

  • Social engineering

  • Resource overload

  • Distributed denial of service

Techniques you'll need to master:

  • Finding threat information

  • Analyzing threat types

If nothing could ever go wrong, we wouldn't need to worry about protecting those network assets. But, of course, things do go wrong, and many of those things are related to security threats. In Chapter 2, “Information Assets,” we said that you need to be able to identify just what your information assets are, what you need to protect them from, and what tools you might have available to do that job—and do it while keeping the network usable by the ordinary user. ...

Get CSI Exam Cram™ 2 (Exam 642-541) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.