CHAPTER 24
Identifying and Defending Against Vulnerabilities
One of the realities of the modern Internet is that new network vulnerabilities will be discovered almost daily. You can also count on those vulnerabilities being exploited soon after they are discovered. An entire industry is growing and profiting from these discoveries, whether they are used maliciously or used to lead to the prevention of future exploitation. In this chapter, you will learn to:
- Identify common computer and network vulnerabilities associated with being connected to the Internet
- Discuss common cybersecurity exploits and defenses
Zero Day Vulnerabilities
When discussing vulnerabilities, you will often hear the term zero day vulnerability or zero day attack. These terms refer to a vulnerability unknown to the product vendor and, therefore, no patch is available to fix it yet. Once the vulnerability is made public, the vendor must scramble to release a patch.
Vulnerabilities can be discovered a number...