chapter_14 - Todd Lammles CompTIA Network+ Chapter 14:...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style Todd Lammle’s CompTIA Network+ Chapter 14: Network Threats and Mitigation Instructor:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 14 Objectives The Following CompTIA Network+ Exam Objectives Are Covered in This Chapter: 6.6 Identify common security threats and mitigation techniques Security threats DoS Viruses Worms Attackers Man in the middle Smurf Rogue access points Social engineering (phishing) Mitigation techniques Policies and procedures User training Patches and updates 2
Background image of page 2
Recognizing Security Threats 3 Viruses are common threats that we hear about all the time, but, there are many other nasty things out there as well. Bad guys who create threats to a network generally have one of two purposes in mind: destruction reconnaissance
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Denial of Service (DoS) 4 DoS attacks come in a variety of flavors. The Ping of Death – In a Ping of Death attack, a oversized ICMP packet is sent to the remote victim flooding the victim’s buffer and causing the system to reboot or hang helplessly. A denial of service (DoS) attack prevents users from accessing the network and/or its resources.
Background image of page 4
Denial of Service (DoS) 5 Smurf The attacker spoofs the intended victim’s IP address and then sends a large number of pings to IP broadcasts. – The receiving router responds by delivering the broadcast to all hosts on the network, and all the hosts on the network respond to the victim with an IP echo reply all of them at the same time.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 SYN Flood In a SYN flood a barrage of SYN packets are sent to a victim. The receiving machine can’t help itself and tries to respond to each SYN request for a connection and quickly depletes its resources trying to deal with the situation. – Any further incoming connections to the victimized
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 21

chapter_14 - Todd Lammles CompTIA Network+ Chapter 14:...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online