Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
In the information security world we face two major types of threats: “noisy” threats which directly interfere with our ability
to do business and “quiet” threats which cause real damage, but don’t necessarily prevent people from doing their jobs.
Noisy threats such as viruses, worms, and spam; attack both networks and systems, and clearly disrupt productivity and
business operations. With highly visible (and often very annoying) attacks, it’s easy to justify investments to curb their
impact. When the CFO see hundreds of spam messages in his inbox, he’s very likely to fund an anti-spam solution.