Network Security: An MPE/iX Overview

page 137/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Who are the adversaries? (cont)
Police
Lines are sometimes crossed when gathering information to pursue a
case
Terrorists
Goal is disruption and damage.
Most have few resources and our unskilled.
National intelligence organizations
Highly funded and skilled
Very risk averse