Graphics Reference
In-Depth Information
Figure 9-5: In this visualization of a suspect component, note that the
computer near the center generates multiple different kinds of attacks
against multiple targets.
Note that other small components could represent bigger threats. Some
attack types may be frequent but relatively harmless, whereas other attack
types may be rare but highly dangerous and indicative of an expert attacker.
 
Search WWH ::




Custom Search