This chapter examined a number of different threats to a typical networked computing environment, and discussed the history of automated threats and the alarming future these threats hold for many individuals and organizations. This chapter asked a repeated question: Is there any reliable, general, and automated way to defend against these threats that takes the behavior of the system and its attacker into account? The remainder of this book focuses on the installation, configuration, and monitoring of the Cisco Security Agent, which provides the solution to these and other security issues facing computing environments today.
18.118.137.243