ABSTRACT

In this chapter we introduce the taxonomy to classify network vulnerabilities and to help understand the types of attacks that can be used against the various protocols discussed throughout the remainder of the book. There are many different ways we can categorize the types of attacks and vulnerabilities seen in computers and networks. As we examine the vulnerabilities for each protocol discussed in the remaining chapters, we will place them into one of four categories. By providing categories of vulnerabilities and attacks we can start to group the defense mechanisms in hope that a single defense mechanism will mitigate multiple attacks.