Chapter 3

Network Security Concepts

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What is the current state of cybersecurity and vectors of data loss?

  • What tools do threat actors use to exploit networks?

  • What are the types of malware?

  • What are common network attacks?

  • How are IP vulnerabilities exploited by threat actors?

  • How are TCP and UDP vulnerabilities exploited by threat actors?

  • How are IP services exploited by threat actors?

  • What are the best practices for protecting a network?

  • What are the common cryptographic processes used to protect data in transit?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

security breach page 95

cybercriminal ...

Get Enterprise Networking, Security, and Automation Companion Guide (CCNAv7) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.