After reading this chapter and completing the exercises, you will be able to do the following:
Describe the most common network attacks, including session hacking, virus attacks, Trojan horses, denial of service, and buffer overflow.
Explain how these attacks are executed.
Identify basic defenses against those attacks.
Configure a system to prevent denial of service attacks.
Configure a system to ...