nThreats
(see 2000 Survey – Figure 8-5)
nOrganizations are under
attack from inside and outside their
electronic perimeter
nAttacks are being
detected
nAttacks can result in
significant losses
nDefending from attacks
requires more than the use
of information security technology