Network Security: An MPE/iX Overview
page 117/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
• Who are the adversaries? (cont)
•Hackers
– Attacks for the challenge
– Own subculture with names, lingo and rules
– Stereotypically young, male and socially on the fringe
– Can have considerable expertise and passion for attacks
•Lone criminals
– Attack for financial gain
– Cause the bulk of computer-related crimes
– Usually target a single method for the attack