© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_7

7. Risk Measurement

Morey J. Haber1  and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 

IT security is clearly the key business issue of today. The words “threat” and “attack” are commonly used as if they connote some monolithic evil that awaits every organization’s infrastructure. In fact, there are many kinds of threats and many modes of attack, and they can originate both inside and outside the organization.

Vulnerabilities in your IT environment can wreak havoc on your business operations. These common weaknesses can be exploited by a variety of external and internal threats, from malicious individuals ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.