CCNA Discovery 1, Chapter 8

8.1.1: An insecure network is vulnerable to information theft, identity theft, data loss or manipulation, and a possible disruption of service. A network faces external threats from unauthorized users who may attack from the Internet, wireless links, or dialup networks. In addition, internal users with physical and authorized access can intentionally or unintentionally harm a network.

8.1.3: An unauthorized user may employ techniques that trick authorized users into revealing sensitive information or taking an action that threatens a network. The following points describe common social engineering techniques that focus on the user as the weak link:

Pretexting: An attacker contacts a user masquerading as the help ...

Get 31 Days Before Your CCENT Certification now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.