Intrusion Attempt Response
Hyper Fujisawa Security
Log Away
Addition of firewall rules
Counter-intellegence
Reverse fingers
Port scans
Host OS ID
Vulnerability scanning
Counter attacks
'Rubber Hose Security'
Goto Next Slide