4 External attacks

This chapter covers

  • Leveraging the hacker mindset and the OODA loop models to plan out our own theoretical attacks against home and company networks
  • Exploring how data injection attacks work
  • Using knowledge of the different types of malware to create defensive strategies
  • Exploring Wi-Fi and mobile phone networks and how data can be intercepted and spoofed

Now that we’ve looked at how to think like a hacker and what mental models we can use, we get to the really fun stuff: exploring how the most common external attacks work. As part of helping you anticipate external attacks, this chapter will have several exercises to teach you how to think and plan an attack yourself. We’ll also look at the different types of malware, as ...

Get Making Sense of Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.