C H A P T E R 11
If a topic is currently on the minds of administrators more than security, we would be hard-pressed to name it. We all know that security threats come in many flavors and levels of severity—from the malicious pop-up Web pages to the invasive worms and viruses that wreak havoc on systems and take their toll on productivity by wasting time and resources to disgruntled employees to nefarious bots to skilled system intruders lurking around our data ready to pounce at any moment..
These threats are often anonymous scripts or executables—automatons—that their human creator has released into the wild. But what about the security violations from real individuals? These are not just elusive system hackers bent on destruction; ...