Foundation Summary
The "Foundation Summary" section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on the CSI exam, a well-prepared CSI candidate should at a minimum know all the details in each "Foundation Summary" section before taking the exam.Rudimentary network attacks include the following:
- Reconnaissance attacks
Gather information about a network in preparation for another possible attack - DoS attacks
Render a service or a network unavailable to legitimate users - Unauthorized access attacks
Attempts made by a person who knowingly tries to access a system for which that person does not have specific access permissions - Application layer attacks
Exploit specific weaknesses in applications, such as web, FTP, or SMTP services, running on a host - Trust exploitation attacks
Bypass all authentication methods on a system
DoS attacks fall into two general categories:
- Nondistributed denial of service
These attacks are directed against a specific service such as Telnet, FTP, or some other service. - Distributed denial of service
These attacks are aimed at a specific host or network with the aim of preventing access to the target by consuming all of the bandwidth to the target.