Identification should include
- disk operating system (DoS) (e.g., flood, fraggle, synchronize flood, ping of death, teardrop, fork)
- distributed denial of service (DDOS)
- domain name system (DNS)
- amplification attacks
- spoofing
- session hijacking (i.e., Transmission Control Protocol/Internet Protocol [TCP/IP], blind and clickjacking, man-in-the-middle, watering hole)
- replay
- Address Resolution Protocol poisoning
- wireless network attacks (i.e., rogue access points, evil twin, worker protection standards attacks, wireless jamming)
- Bluetooth attacks (i.e., bluejacking, bluesnarfing)
- radio frequency identification (RFID) and near field communication (NFC) attacks.
Teacher Resource:
- ORG, Case Study -Wireless Jamming
- ORG, Lab – Clickjacking