This chapter covers the following subjects:
• Vulnerabilities: This section reviews the various number of vulnerabilities that must be reviewed when analyzing a network.
• Intruder motivations: This section reviews the possible motivating factors that are used by the attacking parties.
• Types of network attacks: This section reviews a list of the current network attacks and describes how they are used.
This chapter discusses the potential network vulnerabilities and attacks that pose a threat to networks. In today’s open environment, it has become obvious that security must be a key part of everything up front in order to maintain a truly secured network. In the past, network security was able to be managed ...