If something is valuable, someone will try to steal it. This is certainly true for computer systems and the networks that connect them. These valuable resources are regularly subject to attack from individuals seeking to compromise both data and functionality of network assets. Protecting against threats requires understanding the types of attacks to which networked systems are exposed and the available means of protection. This technical article provides an introduction to common attacks with different types of protection. A number of publicised case histories are included to illustrate the damage that can be sustained by successful attacks and the importance of remaining protected against network threats.
Please sign in or register for FREE
Sign in to E&T Cyber Security Hub
Register to E&T Cyber Security Hub
E&T Cyber Security Hub brings together engineers and cyber security specialists to share practical know-how. With content created ‘by engineers, for engineers,’ it provides peer-reviewed technical information, real-world insights, lessons learnt and case studies, as well as tools for networking and knowledge-sharing, profiles of experts and the opportunity for companies to showcase their expertise.