ABSTRACT

Information technology (IT) continues to grow and develop in complexity, and thus even small to

medium-sized firms have evolved into diverse, complex, and unique infrastructures. One size no longer

fits all, and what works in one environment does not necessarily work in another. So while the underlying

IT infrastructure becomes more challenging to maintain, the threats and vulnerabilities introduced

through today’s “blended” exploits and attacks also grows exponentially.