December 2021
Beginner
550 pages
20h 48m
English
A malicious attack is a threat on an IT infrastructure. An attack on a computer system or network asset succeeds by exploiting a vulnerability or weakness in the design, system, or application. An attack can consist of all or a combination of the following four categories:
Fabrications—Fabrications involve the creation of some deception in order to trick unsuspecting users.
Interceptions—Interceptions involve eavesdropping on transmissions and redirecting them for unauthorized use.
Interruptions—Interruptions cause a break in a communication channel, which blocks the transmission of data.
Modifications—Modifications are the alteration of data contained in transmissions or files.
As stated earlier, security threats ...