Chapter 2. Understanding Vulnerabilities—The Need for Security

On completing this chapter, you will be able to

  • Explain the weaknesses of the TCP/IP protocol suite

  • Describe various types of attacks that exploit weaknesses in the TCP/IP protocol suite

  • Explain how attackers cause buffers to overflow

  • Describe how attackers use spoofing techniques

  • State how attackers use social engineering techniques to capture passwords

On completing this chapter, you will better understand what makes computer systems inherently weak. The chapter covers various vulnerabilities and attack techniques. You will get a clear indication of the need for security, especially the need for assigning the proper responsibilities in the organization.

In general, vulnerabilities can be ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.