Skip to Main Content
Information Security: Contemporary Cases
book

Information Security: Contemporary Cases

by Marie A. Wright, John S. Kakalik
August 2010
Intermediate to advanced content levelIntermediate to advanced
214 pages
9h 49m
English
Jones & Bartlett Learning
Content preview from Information Security: Contemporary Cases
domain name of server; a particularly easy feat for an attacker if an
obvious string (e.g., the company’s name) is used. Once the domain
name is known, an attacker can use a remote procedure call (RPC) query
to access the mappings of each host’s critical information, including the
contents of the passwd file. Other attacks, such as phishing, pharming,
spamming, the use of botnets, and directory harvest attacks can increase
the server load, resulting in a DoS.
Additional information about current network threats and critical
Internet security vulnerabilities can be located at the SANS (SysAdmin,
Audit, Network, Security) Institute site: http://www.sans.org/top20/. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Mark Egan
Breaking into Information Security

Breaking into Information Security

Josh More, Anthony J. Stieber, Chris Liu

Publisher Resources

ISBN: 9780763738198