O'Reilly logo

Effective Incident Response Team, The by Brian Moeller, Julie Lucas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attack Vectors

The following subsections describe some specific attack avenues that may be used to gain unauthorized access to a system, deny the use of information system resources, or conduct reconnaissance on the network. As noted previously, the avenues described here represent merely a sampling of possible attack vectors. Numerous other books provide more in-depth reviews of various types of attacks, and the reader is encouraged to continue research into a larger sample of attacks.

The Human Factor

Default Accounts and Passwords

Most vendors ship hardware and software products with default accounts and passwords already set. Before computer security started gaining more attention over recent years, these default accounts and passwords were ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required