First page Back Continue Last page Summary Graphics
How Cyber-Defenses Fail
Insiders involved in 80% of activities
- routers allow insiders out
- firewalls can be avoided/bypassed
- service restrictions bypassed
- most access controls fail
- intrusion detection systems bypassed
- trusted systems depend on trusted users
- etc.
Notes: