Learning Outcome (LO) Summary: Explain how adversaries implement transmission attacks by targeting network components and services that relay information, viewing attacks on data in transit as connection attacks on physical or software network components, and describe how these methods enable cyber- attacks across physical and geographical boundaries.
Component Learning Outcomes
| ID | Component Learning Outcomes | Cross-Cutting Concepts |
| NS9 | Describe how data transmission attacks are implemented as attacks on components that provide the service of relaying data. | Adversarial thinking |
| NS10 | Explain why attacks on data being sent can often be viewed as connection attacks on network components (physical or software). | Adversarial thinking |
| NS11 | Describe how adversaries leverage network services to execute cyber- attacks, overcoming physical and geographical boundaries. | Adversarial thinking |
Suggestions Accepted for consideration for the next Edition:
Please provide your suggestions about this topic area. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.