Chapter 14. Threats—Analyze, Prevent, Detect, and Respond

Key concepts in this chapter are:

  • Conducting a threat and vulnerability analysis

  • Taking preventative measures

  • Detecting when an attack is in progress

  • Responding to an attack

Hacking is an odd sort of business where high crime can lead to notoriety and a secure, high paying job, at least for some in the long run. This is exemplified by the story of Kevin Mitnick. In January 2003, Kevin Mitnick—perhaps history’s most notorious hacker, who over an eight-year period reportedly broke into some of world’s largest and presumably most secure companies—was released from probation and allowed to reconnect to the Internet. Upon the news of his release, Kevin Mitnick was presented with a number of offers ...

Get Security for Microsoft® Visual Basic® .NET now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.