Page 941 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 941
someone inside your organization by convincing employees that they
are, for example, associated with upper management, technical
support, or the help desk. The victim is often encouraged to make a
change to their user account on the system, such as reset their
password, so the attacker can use it to gain access to the network. The
primary countermeasure for this sort of attack is user training.
Explain the concept of security boundaries. A security
boundary can be the division between one secured area and another
secured area. It can also be the division between a secured area and an
unsecured area. Both must be addressed in a security policy.
Understand the various network attacks and
countermeasures associated with communications security.
Communication systems are vulnerable to many attacks, including
distributed denial of service (DDoS), eavesdropping, impersonation,
replay, modification, spoofing, and ARP and DNS attacks. Be able to
supply effective countermeasures for each.

