CHAPTER 24Identifying and Defending Against Vulnerabilities
One of the realities of the modern Internet is that new network vulnerabilities will be discovered almost daily. You can also count on those vulnerabilities being exploited soon after they are discovered. An entire industry is growing and profiting from these discoveries, whether they are used maliciously or used to lead to the prevention of future exploitation. In this chapter, you will learn to:
- Identify common computer and network vulnerabilities associated with being connected to the Internet
- Discuss common cybersecurity exploits and defenses
Zero Day Vulnerabilities
When discussing vulnerabilities, you will often hear the term zero day vulnerability or zero day attack ...
Get Cybersecurity Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.