Summary

This chapter focused on the various threats and vulnerabilities you’ll encounter. We covered:

  • Types of attacks
  • Malicious code

Some of the attacks discussed are denial-of-service, distributed denial-of-service, backdoor attacks, spoofing attacks, man-in-the-middle attacks, and replay attacks. These are just some of the attacks you may encounter. Each takes advantage of inherent weaknesses in the network technologies most commonly used today.

Common attacks on TCP include the SYN or ACK flood attack, TCP sequence number attack, and TCP/IP hijacking. UDP is vulnerable to flooding attacks. Flooding attacks are DoS attacks, and they’re designed to prevent access by authorized users.

Malicious code describes an entire family of software that ...

Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.