CHAPTER 6Principles of Network Security

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What is the evolution of network security?

  • What are the various types of attack tools used by threat actors?

  • What is malware?

  • What are some common network attacks?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

threat page 297

vulnerability page 297

attack surface page 297

exploit page 297

risk page 298

risk acceptance page 298

risk avoidance page 298

risk limitation page 298

risk transfer page 298

countermeasure page 298

impact page 298

hacker page 298

white hat hackers page 299

gray hat hackers page 299

black hat hackers page 299

script kiddies page ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.