Home > Articles > Security > Network Security

Security Concepts

  • Print
  • + Share This
Blackhats. Crackers. Hackers. Script kiddies. Bad guys. There are countless names for individuals who attempt unauthorized access to or use of your computing infrastructure. In this sample chapter, authors Joseph Dries and Kyle Cassidy discuss who these intruders usually are, and the most common sources of these attacks. Learn what an intruder could do to your site, and what types of security you need in order to prevent it.
This chapter is excerpted from The Concise Guide to Enterprise Internetworking and Security.

The only justification for our concepts and systems of concepts is that they serve to represent the complex of our experiences; beyond this they have no legitimacy.

—Albert Einstein

Who Is Threatening Your Data?

Blackhats. Crackers. Hackers. Script kiddies. Bad guys. Cyber terrorists. Agents of information espionage. Those are some of the many names that the media and the computer industry at large have given to individuals who attempts unauthorized access or use of your computing infrastructure.

Regardless of their designs, we'll call anyone breaking into your system an "intruder" and anyone who is trying to get in an "attacker." Most commonly, attacks come from within, from current or former employees.

 

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.