CHAPTER 13

Types of Attacks and Malicious Software

In this chapter, you will

  • Learn about various types of computer and network attacks, including denial-ofservice, spoofing, hijacking, and password guessing
  • Understand the different types of malicious software that exist, including viruses, worms, Trojan horses, logic bombs, and time bombs
  • Explore how social engineering can be used as a means to gain access to computers and networks
  • Discover the importance of auditing and what should be audited

Attacks can be made against virtually any layer or level of software, from network protocols to applications. When an attacker finds a vulnerability in a system, he exploits the weakness to attack the system. The effect of an attack depends on the ...

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.