Chapter 4. Computer Attacks

No book on computer incidents or incident response would be complete without a discussion of the various types of attacks that may be launched. This chapter provides that discussion, building on the terminology presented in Chapter 3. As this book is not intended to be an in-depth technical guide, such attacks will be described only at a high level. The chapter begins by examining some of the major consequences that can result from an attack, and then looks at some specific vectors used to launch such attacks. It ends with an in-depth discussion of malicious logic, especially the computer virus. Steps that can help organizations reduce their potential for virus infections will also be presented as part of the malicious ...

Get Effective Incident Response Team, The now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.