Abstract
Would your network withstand an attack? How easy would it be for someone to break into your network, find anything they want on your Mac, and steal enough information to masquerade as you on the Internet? To answer this question, you’d need to take a good hard look at your network and audit for intrusion vulnerabilities. Imagine having to catalog all the programs, files, and services that run on your Mac, cross-referencing each program and file extension on the Internet, one at a time, against all the known exploits. This auditing process would take a considerable amount of time. Unfortunately, hackers have easy access to a wide variety of auditing tools, and already have a good idea of which exploits to look for. Thankfully, the very same auditing software can help you expedite the process of keeping them out.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2010 Charles Edge, William Barker, Beau Hunter, and Gene Sullivan
About this chapter
Cite this chapter
Edge, C., Barker, W., Hunter, B., Sullivan, G. (2010). Network Scanning, Intrusion Detection, and Intrusion Prevention Tools. In: Enterprise Mac Security. Apress. https://doi.org/10.1007/978-1-4302-2731-1_17
Download citation
DOI: https://doi.org/10.1007/978-1-4302-2731-1_17
Publisher Name: Apress
Print ISBN: 978-1-4302-2730-4
Online ISBN: 978-1-4302-2731-1
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books