The network designer should be able to guarantee to the company the following important system characteristics:
Before a network designer offers security consultancy services (e.g., risk assessment or business impact analysis), the designer must understand the real threats to the network infrastructure. The different categories of threats to confidentiality, integrity, and availability include the following:
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
- Spoofing (masquerading)
- Telnet attacks
- Password-cracking programs
- Trojans and . . .
The content below this message is for members only.