3.7 Identify Security Issues for Converged Networks
Q&A Self Test
Some people call them hackers. I prefer to call them crackers or attackers; however, regardless of the names assigned, they are an evolving and morphing collective. This group of technically savvy and intensely creative individuals continues to surprise us each month as they develop new techniques for penetrating our networks and systems. While we are spending our days implementing, maintaining, and troubleshooting these networks and systems, the attackers have no such constraints in many cases. The attackers ...