Download Now Free registration required
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public security issues. The most common attacking methods take advantage of the weakness of operating systems, the bugs found in certain applications such as Internet Explorer or Adobe Reader, or incomplete security deployment. As such end users and network administrators have to cope with increasingly complicated network environments in order to ensure that they are under reasonably safe protection. However, the very nature of a network itself means making information accessible. As a matter of fact, networks are themselves designed to be "Open".
- Format: PDF
- Size: 644.74 KB