O'Reilly logo

Eleventh Hour Security+ by Ido Dubrawsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network threats

Network threats exist in today’s world in many forms. One of the more exciting and dynamic aspects of network security relates to the threat of attacks. A great deal of media attention and many vendor product offerings have addressed the topics of attacks and attack methodologies. While there are many different varieties and methods of attack, they can generally all be grouped into several categories:

  • General target of the attack (application, network, or mixed)
  • Whether the attack is an active or passive one
  • How the attack works (e.g., via password cracking, or by exploiting code and cryptographic algorithms)
TCP/IP HIJACKING

TCP/IP hijacking, or session hijacking, is a problem that has appeared in most TCP/IP-based applications, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required