Chapter 3: Evaluating Network Attacks
In today's information superhighway, there is a voluminous amount of data housed on our systems, and traveling over networks and the internet. Because of this, we must face the fact that it's not a matter of whether there will be an attack, it's a matter of when an attack will occur. The reality is that not all attacks are the same. In this chapter, we'll outline how a network can fall victim to either a passive or active attack, and we'll review examples of both. We'll see that while a passive attack may not seem serious, it can be a precursor to an active attack.
In addition, we'll see that there are many attack vectors that, if not properly protected, can lead to data exfiltration or exposure of confidential ...
Get Modern Cryptography for Cybersecurity Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.