Chapter Summary

This chapter discussed the wide range of threats that face modern computer networks, countermeasures to reduce the risk these vulnerabilities pose, and proper procedures to follow when countermeasures fail and a computer-security incident takes place.

KEY TERMS

  • Malicious code objects are deliberately programmed threats, such as viruses, worms, and Trojan horses that attack computer systems and networks.

  • Buffer overflows result when hackers ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.