Chapter 38
Cybersecurity Threats, Vulnerabilities, and Attacks
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
What are the threats, vulnerabilities, and attacks that occur in the various domains?
What are the different deception methods used by attackers to deceive their victims?
What are common types of network attacks?
What are common types of wireless and mobile device attacks?
What are types of application attacks?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Introduction (38.0)
It’s Webster again! The college help desk gets ...
Get Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.