Network Security: An MPE/iX Overview

page 107/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Who are the adversaries?
Categorized in multiple ways:
By objective Raw damage, financial gain, information
By access Insider vs. external
By level of resources funding level, technical expertise..etc.
By level of risk Willing to die, go to jail