Network Security: An MPE/iX Overview
page 137/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
• Who are the adversaries? (cont)
•Police
– Lines are sometimes crossed when gathering information to pursue a
case
•Terrorists
– Goal is disruption and damage.
– Most have few resources and our unskilled.
•National intelligence organizations
– Highly funded and skilled
– Very risk averse