Kamis, 14 Mei 2009

Understanding the Methods of Network Attacks

You might have noticed that this book has thus far referred to computer criminals as “attackers”

rather than “hackers.” This wording is intentional, because not all hackers have malicious intent,

even though the term “hacker” often has a negative connotation. In this section, you will gain

additional insight into the mind-set and characteristics of various hackers.



Additionally, you will be introduced to a variety of methods that attackers can use to

infiltrate a computing system. To help mitigate such attacks, Cisco recommends the

Defense in Depth design philosophy, which also is covered in this section, in addition to a

collection of best practices for defending your network.

Tidak ada komentar:

Posting Komentar