Copyright 2002 by
Prentice Hall, Inc.
8-15
nThreats (see 2000 Survey – Figure 8-5)
nOrganizations are under attack from inside and outside their electronic perimeter
nAttacks are being detected
nAttacks can result in significant losses
nDefending from attacks requires more than the use of information security technology
Security in the Internet Age