O'Reilly logo

Securing Your Business with Cisco ASA and PIX Firewalls by Greg Abelar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attackers

A wise and prudent course of action is to become familiar with the people who pose a threat to you and your business and not underestimate them.

Those who are responsible for network attacks are known by several different names. The most common are hackers, crackers, phreaks, or attackers. This book uses the term hacker and attacker interchangeably. Attackers are those who attempt to run software with malicious intent on or against a network device that doesn't belong to them.

The sophistication of attackers ranges from people who are elite programmers to people who download and run well-documented scripts. Script downloaders are often referred to as script kiddies. Don't make the mistake of thinking that a script kiddie, who is not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required