Chapter 3 - Attacks and Malicious Code
Objectives
- Explain denial of service (DOS) attacks
- Explain and discuss ping-of-death attacks
- Identify the major components used in a DDOS attack and how they are
installed
- Understand the major types of spoofing attacks
- Discuss man-in-the-middle attacks, replay attacks, and TCP session
hijacking
- Detail three types of social-engineering attacks and explain how they can
be incredibly damaging
- List the major types of attacks used against encrypted data
- List the major types of malicious software and identify a counter-measure
for each one
Homework
- PowerPoint
- Test
- Vocabulary
- Chapter Assignment: Review Questions (1-21) and run a
software program such as AdAware (available at www.lavasoft.de) and
SpyBot on either your
own computer or one of the classroom PCs in 231. Document in your notebook,
what the differences are between what programs finds, how long it takes and if
it has any problems.
CNG 131 Home