CHAPTER 5

Vulnerabilities and Threats

Now that we’ve covered some of the theory and understood the issues at stake, the types of asset that can be affected, together with the possible impacts, we can continue by examining the vulnerabilities that can permit many of these threats to occur, and then move on to the main threats that can be the cause of cyber issues.

Business Continuity Cyber Vulnerabilities

Vulnerabilities are weaknesses in assets that can be exploited by threats. Typical examples would be little or no access control in computer systems, or poor physical security at the organization’s buildings.

It is not unreasonable to imagine that most vulnerabilities are of a technical nature, but this is actually far from correct. It is true ...

Get Business Continuity in a Cyber World now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.