O'Reilly logo

Cisco Security Agent by Chad Sullivan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Present: Blended Threats

Just as computers have become more complex and efficient with new productivity features, so have security threats become complex and efficient. Just about any feature you have come to love over time can be exploited and used against you or others if not appropriately implemented and correctly secured. To help illustrate this concept, you need look no further than your favorite e-mail program. If someone releases an exploit that compromises a system running a vulnerable e-mail application, the exploit may inappropriately send unauthorized e-mails containing a virus to everyone in the local address book. These e-mails appear to come from the local user s address; therefore, they have a much better chance of compromising ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required