Looking for something else?
Excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems, from the eBook The Shortcut Guide to Protecting Business Internet Usage, by Dan Sullivan, this seven-tip collection provides an in-depth look at the information security threat types with which enterprise security professionals must contend.
Various information security threats -- worms, rootkits, Trojans, denial-of -service attacks -- and how they operate are all reviewed. Hacking tools and tactics, like social engineering, are also covered.
Once you're up-to-speed on the myriad information security threats and ways to mitigate them, you can review guidelines for determining which cost-effective countermeasures will best suit your enterprise needs.
How to assess and mitigate information security threats