PART 5Workplace Security
CHAPTER 14Network Scanning, IntrusionDetection, and IntrusionPrevention Tools
Would your network withstand the attack? How easy would it be for someone to break into your network, find anything they want on your Mac, and steal enough information to masquerade with your identity on the Internet? To answer this question, you'd need to take a good hard look at your network and audit for intrusion vulnerabilities. Now imagine having to catalog all the programs, files, and services that run on your Mac, cross-referencing each program and file extension on the Internet, one at a time, against all the known exploits. This auditing procedure could take a considerable amount of time. Unfortunately, hackers have access to these ...
Get Foundations of Mac OS X Leopard Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.