Chapter 4

Preventing System Intrusions

Michael West,    Senior Technical Writer, Truestone Maritime Operations

There’s a war raging across the globe, and you’re right in the middle of it. But while this war doesn’t include gunfire and mass carnage, its effects can be thoroughly devastating nonetheless. This war is being waged in cyberspace by people bent on stealing the heart and soul of your business, your company’s plans and secrets, or worse, your client names and their financial information.

So how bad is it? Just what are you up against?

Imagine this: You’re in charge of security for an advanced movie screening. You’ve been hired and assigned the daunting task of keeping the advanced screening from being copied and turned into a bootleg ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.