CHAPTER 7Network Attacks: A Deeper Look

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What is the importance of network monitoring?

  • How is network monitoring conducted?

  • How do IP vulnerabilities enable network attacks?

  • How do TCP and UDP vulnerabilities enable network attacks?

  • What are the IP vulnerabilities?

  • How do network application vulnerabilities enable network attacks?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

network TAP page 333

port mirroring page 334

Switch Port Analyzer (SPAN) page 334

session hijacking page 343

OS fingerprinting page 344

amplification and reflection techniques page 346

non-blind spoofing page 348

blind ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.