Network Security: An MPE/iX Overview

page 97/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Types of Attacks (cont)
Legal Attack
Setup situation to use discovery process to gather information
Rare, but possibly devastating