The "Foundation Summary" section of each chapter lists the most important facts from the chapter. Although this section does not list every fact from the chapter that will be on the CSI exam, a well-prepared CSI candidate should at a minimum know all the details in each "Foundation Summary" section before taking the exam.
Rudimentary network attacks include the following:
Reconnaissance attacks Gather information about a network in preparation for another possible attack
DoS attacks Render a service or a network unavailable to legitimate users
Unauthorized access attacks Attempts made by a person who knowingly tries to access a system for which that person does not have specific access permissions
Application layer attacks Exploit specific weaknesses in applications, such as web, FTP, or SMTP services, running on a host
Trust exploitation attacks Bypass all authentication methods on a system
DoS attacks fall into two general categories:
Nondistributed denial of service These attacks are directed against a specific service such as Telnet, FTP, or some other service.
Distributed denial of service These attacks are aimed at a specific host or network with the aim of preventing access to the target by consuming all of the bandwidth to the target.