Chapter 28

The Enemy (The Intruder’s Genesis)

Pramod Pandya Dr. ,    CSU Fullerton

1 Introduction

In last few years, we have read and experienced the nature of such threats, resulting in loss of credit-card numbers, Social Security numbers, passwords, and other sensitive information. Security for the network has grown from a simpleminded approach to a multilevel approach, depending on the complexity of the network. As the number of Intranets connected to the Internet has grown, threat to network security has progressed from simple need for network security engineers to need for information security engineers. The primary function of network security engineers was to design network architecture to secure and protect network resources from unauthorized ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.