Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks. | continued Internal attacker External attacker Corporate Assets Virus Incorrect permissions A network security design protects assets from threats and vulnerabilities in an organized manner To design security, analyze risks to your assets and .