Summary: |
The aim of this chapter is to introduce several types of attack vectors or methodologies that may be used by malicious hackers against a network infrastructure. The list can be long. Attacks come in many forms including malware, social engineering, insider threats, remote and many more.
In this chapter, focus is given exclusively to network attacks. These are attacks that can take advantage of some vulnerabilities within a network protocol or application, which can be exploited remotely via the network. |