O'Reilly logo

Designing and Building Security Operations Center by David Nathans

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A

Threats and attacks
Threat vectors:
An entry point or media that an attacker can use to carry out an attack.
Attack types:
Names given to common methods of disrupting, degrading, destroying, or denying access to a system or resource. Can also be the name of a method that is used to collect data and information.
802.11 Wireless
CD ROM/DVD ROM
Bluetooth
Cloud computing
Email
Files
Instant messaging
Internet connectivity
Malicious proxy
NFC scanning
Onion routing networks
P2P
QR scanning
Remote access
Rogue tunnels
Social engineering
Social networking sites
Terminal services
USB storage devices
Voice over IP
Web browser
Web page
Backdoors
Botnets
Buffer overflow
Cache poisoning
Cross site scripting
DDOS
DNS reflection
DOS
Eavesdropping/sniffing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required