From the list below, pick the four most significant attacks you will consider in protecting the WWTC network security design. Explain how the attacks work and how you would mitigate them.
- Medium Network Campus Top 10 Attacks
- Ransomware
- Advanced Persistent Threat
- Virus/worm/Trojan horse
- DDoS
- Sniffer
- Man-in-the-middle (MITM)
- War dialing/driving
- DNS Rebinding
- ARP redirection/spoofing
- SQL Injection
- Buffer over?ow