O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

This chapter discussed the wide range of threats that face modern computer networks, countermeasures to reduce the risk these vulnerabilities pose, and proper procedures to follow when countermeasures fail and a computer-security incident takes place.

KEY TERMS

  • Malicious code objects are deliberately programmed threats, such as viruses, worms, and Trojan horses that attack computer systems and networks.

  • Buffer overflows result when hackers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required