Chapter 38

Cybersecurity Threats, Vulnerabilities, and Attacks

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What are the threats, vulnerabilities, and attacks that occur in the various domains?

  • What are the different deception methods used by attackers to deceive their victims?

  • What are common types of network attacks?

  • What are common types of wireless and mobile device attacks?

  • What are types of application attacks?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Software as a Service (SaaS)

threat domain

Introduction (38.0)

It’s Webster again! The college help desk gets ...

Get Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.