Chapter 4. Threats, Vulnerability Analysis, and Mitigation

Recognize and Mitigate Common Attacks

Unauthorized network access or attacks can cause damage or destruction to proprietary data, negatively affecting company productivity and the capability to compete. These sections highlight the various common attack scenarios and identify methods for mitigating those attacks or unauthorized network access.

ICMP Attacks and PING Floods

ICMP or PING flood attacks are aimed at network devices with an intention to overwhelm them with attack traffic and thereby slow down legitimate movement. The attacker typically is on a higher bandwidth network compared to the target device and sends continuous ICMP Echo Request (PING) packets toward the target. The ...

Get CCIE Security v4.0 Quick Reference, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.