O'Reilly logo

SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5

Attacks

In this chapter, you will learn about

•  Differences between hackers and crackers

•  Differences between white hats, black hats, and gray hats

•  Advanced persistent threats

•  Basic countermeasures used to thwart attacks

•  Common denial of service (DoS) and distributed DoS (DDoS) attacks

•  Botnets and zombies

•  Software security countermeasures

•  Phishing, spear phishing, and whaling

•  Social engineering tactics and countermeasures

•  The importance of training as a countermeasure

Comparing Attackers

Attackers break into computers and networks with malicious intent and often for personal gain. Sometimes, they try to take down a system or put it out of service. Other times, they try to get into the system to gain information. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required