The Present: Blended Threats
Just as computers have become more complex and efficient with new productivity features, so have security threats become complex and efficient. Just about any feature you have come to love over time can be exploited and used against you or others if not appropriately implemented and correctly secured. To help illustrate this concept, you need look no further than your favorite e-mail program. If someone releases an exploit that compromises a system running a vulnerable e-mail application, the exploit may inappropriately send unauthorized e-mails containing a virus to everyone in the local address book. These e-mails appear to come from the local user s address; therefore, they have a much better chance of compromising ...
Get Cisco Security Agent now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.