Download Now Free registration required
Off late when the first worms began to assault networks worldwide, modern attackers of network security have been using a version of this ancient military tactic. To date, they have unleashed three successive waves of attacks, each managing to penetrate vulnerable parts of the network. However, one key difference between these attacks and ancient ones is that network hackers have become increasingly sophisticated and have continually adapted their methods as defenses have tightened. For organizations trying to shore up network defenses, It5 important to understand how the security threat landscape has evolved. Only then is it possible to determine the best use of network-security solutions - particularly Intrusion Prevention Systems (IPS) - to block ongoing and future waves of attacks.
- Format: PDF
- Size: 2257.5 KB