MODULE 21

Network Threats

We’ve already discussed host-based threats, and although many threats exploit vulnerabilities and issues on the host, most host threats actually come from the network in the form of network attacks or malware that is sent through the network to infect a host through phishing e-mails and so on. So it makes sense that we should talk about network-based threats specifically, since they are often used to carry out attacks on hosts. In this module, we’ll look at some of the basic large-scale network and denial-of-service attacks used on hosts and networks.

Network Attacks

A defining characteristic of a network attack is that it comes in the form of specially crafted network communications traffic. This could involve large ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.