Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 1. There Be Hackers Here! > Targets of Opportunity

Targets of Opportunity

I cannot keep track of the number of times I have been with customers who discuss their network and its security only to hear the following:

“We are a <Non-IT business> and there is nothing on our network that a hacker would want. Why should we be worried about making sure our network is secure?”

Wow! What a statement. It astounds me every time I hear it. There are many ways to reply to such a statement—some of which are politically correct, and some of which are not. Usually the person making this statement is a customer, so the focus here should be on the politically correct response.

This statement epitomizes an attitude known as Security Through Obscurity. In this book, you will see that when it comes to security, relying on obscurity is dangerous, regardless of the company’s size or business, and it is rarely if ever effective. Just because you haven’t been p0wned yet does not mean it won’t happen to you or your corporation. Even if you have sophisticated monitoring, detection, and threat remediation tools and processes in place, how could you be sure the threats and exploits have not evolved past your current controls and countermeasures?


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint