© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_21

21. Making It All Work

Morey J. Haber1  and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 

The evolution of network computing environments – including the increased use of mobile, cloud, and virtual infrastructure – has created a continuous stream of new attack vectors for adversaries to prey on. This is the ever expanding security perimeter outside of your organization including privileges and vulnerabilities. Regardless of the tactics used, most breaches comprise some exploitation of software vulnerabilities, system configuration settings, or poor privileged hygiene.

However, despite widespread deployment ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.