Chapter 2. Understanding VulnerabilitiesThe Need for Security
On completing this chapter, you will be able to
- Explain the weaknesses of the TCP/IP protocol suite
- Describe various types of attacks that exploit weaknesses in the TCP/IP protocol suite
- Explain how attackers cause buffers to overflow
- Describe how attackers use spoofing techniques
- State how attackers use social engineering techniques to capture passwords
On completing this chapter, you will better understand what makes computer systems inherently weak. The chapter covers various vulnerabilities and attack techniques. You will get a clear indication of the need for security, especially the need for assigning the proper responsibilities in the organization.