A network engineer must understand the real threats to the network infrastructure (e.g., risk assessment or business impact analysis) before he can offer security consultancy services. We will analyze different categories of threats to confidentiality, integrity, and availability, including:
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
- Spoofing (masquerading)
- Telnet attacks
- Password cracking programs
- Trojans and worms
These threats must be analyzed in the context of the network areas they affect and considering the exact system component they target.
Denial . . .
The content below this message is for members only.