Network Security: An MPE/iX Overview
page 127/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
• Who are the adversaries? (cont)
•Malicious insiders
– Already inside the system
– Knows weaknesses and tendencies of the organization
– Very difficult to catch
•Industrial Espionage
– Gain a competitive advantage by stealing trade secrets
•Press
– Gather information for a story to sell papers/commercial time
•Organized crime
– Lots of resources to put behind their attacks…usually very lucrative