Network Security: An MPE/iX Overview

page 117/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Who are the adversaries? (cont)
Hackers
Attacks for the challenge
Own subculture with names, lingo and rules
Stereotypically young, male and socially on the fringe
Can have considerable expertise and passion for attacks
Lone criminals
Attack for financial gain
Cause the bulk of computer-related crimes
Usually target a single method for the attack