CHAPTER 5

Attacks

In this chapter, you will learn about

•  Differences between hackers and crackers

•  Differences between white hats, black hats, and gray hats

•  Advanced persistent threats

•  Basic countermeasures used to thwart attacks

•  Common denial of service (DoS) and distributed DoS (DDoS) attacks

•  Botnets and zombies

•  Software security countermeasures

•  Phishing, spear phishing, and whaling

•  Social engineering tactics and countermeasures

•  The importance of training as a countermeasure

Comparing Attackers

Attackers break into computers and networks with malicious intent and often for personal gain. Sometimes, they try to take down a system or put it out of service. Other times, they try to get into the system to gain information. ...

Get SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.