Risk Management The Big Picture – Part 2
If attackers are going to take advantage of vulnerabilities, it makes sense that we need to find them
before they do. System, network, and telephone vulnerability scanning tools are a powerful method
of doing this.
Lets take a look at another Internet threat. This is the threat introduced by users who download and run utilities that
are designed to share and search for files across the Internet. Examples are the programs Napster, Gnutella, and more
recently Scour. In the next two slides we’ll examine Gnutella, its function, and the dangers it introduces....