Chapter 2

Types of Attacks

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Describe the most common network attacks, including session hacking, virus attacks, Trojan horses, denial of service, and buffer overflow.

  • Explain how these attacks are executed.

  • Identify basic defenses against those attacks.

  • Configure a system to prevent denial of service attacks.

  • Configure a system to defend against Trojan horse attacks.

  • Configure a system to defend against buffer overflow attacks.

Introduction

Chapter 1, “Introduction to Network Security,” introduced some general dangers to computer systems and provided an overview of network security. This chapter examines specific types of attacks ...

Get Network Defense and Countermeasures: Principles and Practices, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.