Understanding the threat
Abstract
This chapter provides a 40-year encapsulation of cyber attacks, starting with the first computer worm and working through to large scale DDoS attacks, the chapter reviews the history of network security threats, what the current state is and what is to come.
Keywords
Introduction
Get Building an Intelligence-Led Security Program now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.