课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Maintaining network availability

Maintaining network availability

- [Instructor] Sometimes attackers try to undermine network security by denying legitimate users access to the network. Let's take a look at some techniques that you can implement to defend your network against these attacks. Many denial-of-service attacks rely upon flooding devices with traffic until they're overwhelmed. One example of this type of attack is the SYN flood. In a SYN flood attack, the attacker creates thousands of partially open TCP connections to a device by sending SYN packets, but never answering the SYN act packet to complete the three-way handshake. This is one example of flooding, and there are many similar attacks in the hacker's toolkit. Another example, MAC flooding, occurs when attackers send large numbers of different Mac addresses to a switch, hoping to overflow the switch's Mac address table and cause it to forget where devices are, and then flood traffic out to every switch port, allowing the attacker to eavesdrop on sensitive communications. Network…

内容