With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously. While many publications exist about software that can be used to secure computer environments, very few publications exist that explain how hacker attacks are actually performed. If you are responsible for securing your company`s computer environment, it`s important you understand how attacks work. In this article, Michael Pichler analyzes some interesting network attacks and explains how they work. You`ll see how inventive attackers can be, and you`ll learn how some features included in your own software can actually be turned against you. This article is aimed at those who have some understanding of networking, but don`t necessarily work in the networking field on a daily basis. Full Story
About OODA Analyst
OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.