Network Security: An MPE/iX Overview

page 127/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Who are the adversaries? (cont)
Malicious insiders
Already inside the system
Knows weaknesses and tendencies of the organization
Very difficult to catch
Industrial Espionage
Gain a competitive advantage by stealing trade secrets
Press
Gather information for a story to sell papers/commercial time
Organized crime
Lots of resources to put behind their attacksusually very lucrative