This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: analyst could develop secure protocols to use. In order to prevent attacks on networks and personal items an understanding of how attackers gain access is a key factor. Anyone can install security updates but that alone does not ensure a secure environment, being proactive in a network will ensure the overall security stays strong. ATTACK PREVENTION IN THE DIGITAL AGE 3 References Pleeger, C. (2012). Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson Publication Rowe, N. (n.d.) Cyber-Attacks. Retrieved on February 3, 2016. from http://faculty.nps.edu/ncrowe/edg_attacks.htm...
View Full Document
- Winter '16
- Computer Security, Outline, attack, attack prevention, Jesse Livesay, Christopher Weppler