Summary

This chapter discussed a number of topics that comprise the current state of network security.

The chapter summarized reasons why malicious actors exist and what motivates them to attack our networks. The chapter then covered some of the methods used by these actors, including DDoS attacks and the use of social engineering. Next, the chapter provided an overview of some tools and techniques that can help network administrators identify the existence of malware used by malicious actors on their network. The chapter concluded with a brief look at the types of data that these malicious actors are looking to exfiltrate from your networks.

Get Santos:CCNA Sec 210-260 OCG now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.