O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attack Methods and Countermeasures

  • Identify and explain basic malicious code threats and common defensive mechanisms.

To design an effective defense against malicious use of your network, it's important to gain an understanding of the general and specific threats that you face in the contemporary computing environment.

We'll look at six main types of attacks: malicious code, buffer overflow attacks, denial-of-service attacks, network reconnaissance, use of hacker tools, and physical/human attacks. We'll also examine some of the countermeasures that can be applied to harden your systems against these risks.

Malicious Code

Malicious code threatens computing systems every day—it's been around in one form or another almost as long as we've used computers. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required