Summary

This chapter presented an overview of the major categories of computer attacks as well as some specific attack vectors. Although the attacks described are in no way inclusive of all the attacks known, the descriptions should provide some insight into some of the many “needles in a haystack” that the incident response team must be prepared to detect and manage. The chapter concluded with a discussion of malicious logic infections, particularly viruses. Several pointers for protecting a computer or network from a virus infection were presented.

Incident response teams must be prepared to deal with any type of attack that may be launched against the operating systems used in their infrastructure. Not every form of attack may be used on every ...

Get Effective Incident Response Team, The now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.