Page 1499 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1499

them. The two most common examples are cross-site scripting (XSS)
               and SQL injection attacks.

               Know the network reconnaissance techniques used by

               attackers preparing to attack a network. Before launching an
               attack, attackers use IP sweeps to search out active hosts on a network.
               These hosts are then subjected to port scans and other vulnerability
               probes to locate weak spots that might be attacked in an attempt to
               compromise the network. You should understand these attacks to help

               protect your network against them, limiting the amount of
               information attackers may glean.
   1494   1495   1496   1497   1498   1499   1500   1501   1502   1503   1504