Attack Vectors

The following subsections describe some specific attack avenues that may be used to gain unauthorized access to a system, deny the use of information system resources, or conduct reconnaissance on the network. As noted previously, the avenues described here represent merely a sampling of possible attack vectors. Numerous other books provide more in-depth reviews of various types of attacks, and the reader is encouraged to continue research into a larger sample of attacks.

The Human Factor

Default Accounts and Passwords

Most vendors ship hardware and software products with default accounts and passwords already set. Before computer security started gaining more attention over recent years, these default accounts and passwords were ...

Get Effective Incident Response Team, The now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.