Summary

This chapter examined a number of different threats to a typical networked computing environment, and discussed the history of automated threats and the alarming future these threats hold for many individuals and organizations. This chapter asked a repeated question: Is there any reliable, general, and automated way to defend against these threats that takes the behavior of the system and its attacker into account? The remainder of this book focuses on the installation, configuration, and monitoring of the Cisco Security Agent, which provides the solution to these and other security issues facing computing environments today.

Get Cisco Security Agent now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.