Summary

This chapter examined a number of different threats to a typical networked computing environment, and discussed the history of automated threats and the alarming future these threats hold for many individuals and organizations. This chapter asked a repeated question: Is there any reliable, general, and automated way to defend against these threats that takes the behavior of the system and its attacker into account? The remainder of this book focuses on the installation, configuration, and monitoring of the Cisco Security Agent, which provides the solution to these and other security issues facing computing environments today.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.137.243