Summary
In this chapter, we learned about various types of attacks on computer systems, attackers’ motivation to execute them, and possible consequences for users.
We also learned about common strategies for keeping your systems protected from attacks. However, we only scratched the surface – information security is a large field, and keeping your knowledge of it up to date and your systems safe is a life-long pursuit for every system administrator.