Network Security: An MPE/iX Overview
page 107/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
• Who are the adversaries?
•Categorized in multiple ways:
– By objective – Raw damage, financial gain, information
– By access – Insider vs. external
– By level of resources – funding level, technical expertise..etc.
– By level of risk – Willing to die, go to jail