A network security strategy for the age of terrorism

By on
A network security strategy for the age of terrorism

Just as bacteria evolve around the technological barriers we put in their place, so too do the tactics and strategies employed by computer attackers. When a security measure is put in place, our enemies immediately set out to exploit its weakness. When they are repelled, they adapt their tactics and strategies, regroup and come back yet again.

There has also been an evolution in terms of intent and impact for electronic attackers. The intent has shifted from one of vandalism and joy-riding to that of financial gain. This shift has been accompanied by the organisation of the attackers from that of individuals to international crime ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now

Most Read Articles

Log In

|  Forgot your password?