Chapter 2. Understanding Vulnerabilities—The Need for Security
On completing this chapter, you will be able to
Explain the weaknesses of the TCP/IP protocol suite
Describe various types of attacks that exploit weaknesses in the TCP/IP protocol suite
Explain how attackers cause buffers to overflow
Describe how attackers use spoofing techniques
State how attackers use social engineering techniques to capture passwords
On completing this chapter, you will better understand what makes computer systems inherently weak. The chapter covers various vulnerabilities and attack techniques. You will get a clear indication of the need for security, especially the need for assigning the proper responsibilities in the organization.
In general, vulnerabilities can be ...
Get Network Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.