Loading previews...
Summary: | The aim of this chapter is to introduce several types of attack vectors or methodologies that may be used by malicious hackers against a network infrastructure. The list can be long. Attacks come in many forms including malware, social engineering, insider threats, remote and many more. In this chapter, focus is given exclusively to network attacks. These are attacks that can take advantage of some vulnerabilities within a network protocol or application, which can be exploited remotely via the network. |
---|---|
Creators: | |
Divisions: | Academic > School of Computing, Engineering and Built Environment > Department of Computing > Computing |
Copyright holder: | Copyright © Glasgow Caledonian University |
Viewing permissions: | World |
Depositing User: | |
Date Deposited: | 27 Nov 2018 14:52 |
Last Modified: | 13 Feb 2020 12:00 |
URI: | https://edshare.gcu.ac.uk/id/eprint/4315 |
Actions (login required)
View Item |
Toolbox
There are no actions available for this resource.