Chapter 3: Evaluating Network Attacks
In today's information superhighway, there is a voluminous amount of data housed on our systems, and traveling over networks and the internet. Because of this, we must face the fact that it's not a matter of whether there will be an attack, it's a matter of when an attack will occur. The reality is that not all attacks are the same. In this chapter, we'll outline how a network can fall victim to either a passive or active attack, and we'll review examples of both. We'll see that while a passive attack may not seem serious, it can be a precursor to an active attack.
In addition, we'll see that there are many attack vectors that, if not properly protected, can lead to data exfiltration or exposure of confidential information. You'll learn that, today, data is in many places and is growing at an exponential rate, and with this growth comes a greater need to protect the data. Finally, you'll get a better...