Attacks

Learning Outcome (LO) Summary: Explain how adversaries implement transmission attacks by targeting network components and services that relay information, viewing attacks on data in transit as connection attacks on physical or software network components, and describe how these methods enable cyber- attacks across physical and geographical boundaries.

Component Learning Outcomes

ID Component Learning Outcomes Cross-Cutting Concepts
NS9 Describe how data transmission attacks are implemented as attacks on components that provide the service of relaying data. Adversarial thinking
NS10 Explain why attacks on data being sent can often be viewed as connection attacks on network components (physical or software). Adversarial thinking
NS11 Describe how adversaries leverage network services to execute cyber- attacks, overcoming physical and geographical boundaries. Adversarial thinking

Suggestions Accepted for consideration for the next Edition:

Please provide your suggestions about this topic area. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.

Leave a Reply

Your email address will not be published. Required fields are marked *