Chapter 6. Classifying Rudimentary Network Attacks
This chapter covers thefollowing types of attacks:
- Reconnaissance Attacks
- Denial of Service Attacks
- Unauthorized Access Attacks
- Application Layer Attacks
- Trust Exploitation Attacks
This chapter covers a wide range of attacks, including reconnaissance attacks, unauthorized access, denial of service (DoS) attacks, application layer attacks, and trust exploitation attacks. All of these attacks are designed for either one of two purposes: to gain access to a system or network or to deny access to a system or network to legitimate users. To understand how to defend against these attacks, you first must understand how the attacks work. Therefore, each of these attacks is covered in greater detail in the sections that follow. Defense against the attacks described here is covered in Chapter 8, "Mitigating Rudimentary Network Attacks."