Summary

This chapter presented an overview of who attackers are, what motivates them to attack, what they do when they attack, and how they attack. By understanding how attacks are conducted and with what tools, the IT security professional stands a better chance of building the proper information security controls and security countermeasures to combat known vulnerabilities and exploits. Prior to conducting a risk and vulnerability assessment, the assessor can gain a better understanding of potential weaknesses and vulnerabilities in the IT organization by understanding how an attacker thinks.

If the risk and vulnerability assessment project incorporates how to mitigate risk from attacks and known attack methods and tools, the organization ...

Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.