Tuesday, March 16, 2010

Application attack

Books 2 Byte
CCNA Security
Richard A. Deal
(http://www.tatamcgrawhill.com/)

Five phases of IT attack

If you are in the business of IT security, you may perhaps know the answer to this elementary question: “What is the most common type of attack? a) Buffer overflow; b) Trojan horse; c) Operating system; d) Application.” To the rest of us, the answer is d, the application attack, as Richard A. Deal writes in CCNA Security.

More

No comments: