An Overview of IT Security Threats and Attacks

From Techotopia
Revision as of 21:23, 11 February 2008 by Neil (Talk | contribs) (New page: Before moving on to chapters that outline the steps necessary to secure networks and computer systems it helps to first have an understanding of the kinds of attacks and threats that need ...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Before moving on to chapters that outline the steps necessary to secure networks and computer systems it helps to first have an understanding of the kinds of attacks and threats that need to be defended against. Armed with this information it will be clearer in later chapters not just how to implement particular security measure, but also why such measures need to be implemented.

There are a variety of different forms of attack to which a network or computer system may be exposed and the wealth of information and ubiquity of the internet mean that just about anyone with a computer, an internet connection and malicious intentions