Chapter 15

Security Considerations

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What are the different types of network security threats?

  • What are social engineering attacks?

  • What are the various types of malicious software?

  • What are denial-of-service attacks?

  • How do security tools and software updates mitigate network security threats?

  • How does antimalware software mitigate data loss and service disruptions?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

botnet page 307

denial-of-service (DoS) attack page 308

distributed denial of service (DDoS) page 309

malware page 304

phishing page 303

Trojan horse page 305

virus page 305

worm page ...

Get Networking Essentials Companion Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.