Chapter . Introduction
In today’s network security environment, an epidemic of sorts exists. Many corporations understand that they need security devices to protect them from network-based attacks. The problem is, because security devices have been deployed, corporations blindly trust that they are doing their job and that threats are being stopped. This is the biggest fallacy in the network security world today. Hackers, of course, know this and design attacks to subvert existing security appliances by using valid protocols and valid network packets.
Enterprises and corporations now realize that to really provide effective protection for their networks, they need to take the next step and closely examine network infrastructure, host, application, ...
Get Security Threat Mitigation and Response: Understanding Cisco Security MARS now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.