Skip to Main Content
Business Continuity in a Cyber World
book

Business Continuity in a Cyber World

by David Sutton
June 2018
Intermediate to advanced content levelIntermediate to advanced
204 pages
4h 42m
English
Business Expert Press
Content preview from Business Continuity in a Cyber World

CHAPTER 5

Vulnerabilities and Threats

Now that we’ve covered some of the theory and understood the issues at stake, the types of asset that can be affected, together with the possible impacts, we can continue by examining the vulnerabilities that can permit many of these threats to occur, and then move on to the main threats that can be the cause of cyber issues.

Business Continuity Cyber Vulnerabilities

Vulnerabilities are weaknesses in assets that can be exploited by threats. Typical examples would be little or no access control in computer systems, or poor physical security at the organization’s buildings.

It is not unreasonable to imagine that most vulnerabilities are of a technical nature, but this is actually far from correct. It is true ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Business of Cybersecurity

The Business of Cybersecurity

Ashwini Sathnur
Business Continuity and Disaster Recovery for InfoSec Managers

Business Continuity and Disaster Recovery for InfoSec Managers

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP

Publisher Resources

ISBN: 9781947441477