Join Lisa Bock for an in-depth discussion in this video Surveying common attack methods, part of IT Security Foundations: Network Security.
- Security mechanisms and controls are needed…on multiple levels.…As without a layered approach, you could be a victim…of an attack.…Some attacks are passive such as sniffing or scanning,…and they are done because of a need to discover…information about a network.…Active attacks are designed to interrupt service,…destroy data, or steal information.…We see here a depiction of the seven layer OSI model.…There are attacks in virtually every layer of the OSI model.…
We'll take one more step and separate this,…and I'll just show you that the first two layers,…layer one and layer two, are essentially hardware attacks.…Layers three through seven are more directed…at software attacks.…The application layer.…The application layer is where we initiate contact…with the network.…Here we see software attacks.…This will exploit some weakness in the code.…Other examples would include phishing via email…or popups and malware such as viruses, spyware, trojans,…and worms.…
The presentation layer is where the data is presented for…
Released
11/30/2015Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Implementing secure content management (SCM)
- Implementing unified threat management (UTM)
- Introducing VLANs
- NAT addressing
- Network sniffing
- Understanding common attack methods, such as password attacks
- Protecting clients with antivirus software
- Implementing physical security
Share this video
Embed this video
Video: Surveying common attack methods