Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers attacks that can elude intrusion detection systems. One of these attacks is called an insertion attack. This involves disguising a malicious code to sneak past an IDS. To prevent these kind of attacks, networks can use the following tools: - Honeypot - Padded cell and vulnerability tools This lessons also touches on e mail vulnerabilities such as phishing, spoofing and spam. It is also important to remember about fax vulnerabilities, which can be remedied via use of fax servers.