Host Threats

Now that we have looked at the various principles of security, risk, and components of technical controls, such as encryption, let’s examine host security at a deeper level. In this module we are going to discuss threats that are centered on individual network-connected hosts. Remember that a host isn’t just a PC or a Mac; it can be a network device, a specialized piece of biomedical equipment connected to the network, or any other device that has an IP address and sends or receives network traffic. The primary threats we will focus on in this module are malware attacks and other host-based attacks; later on in the book we will talk about other threats, such as those that come from and adversely affect the network itself ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.