Hour 22. Network Intrusion

What You’ll Learn in This Hour:

  • Types of intruders

  • Goals of the intruder

  • Intrusion techniques

When the experts started designing networks, they had no idea that legions of unauthorized users would spend thousands of hours trying to get inside. This hour describes some of the methods used for network attacks.

At the completion of this hour, you’ll be able to

  • Describe how intruders obtain passwords

  • Describe how intruders access systems using techniques such as buffer overflow and session hijacking

  • Describe a phishing attack

  • Describe denial-of-service attacks

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.94.249