Skip to content
Skip to main content

About this free course

Become an OU student

Download this course

Share this free course

Network security
Network security

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Figure 2 Forms of attack (Source: based on Stallings, 2001, p. 64)

 3.2 Important terminology and information for making the most of this section