December 2022
Intermediate to advanced
222 pages
7h 19m
English
In this chapter, we will take a look at one of the methods of reducing our cyber security risks – sharing information about threats and vulnerabilities.
It’s worth bearing in mind that knowledge of vulnerabilities may lead an attacker to be able to mount a successful attack, but it’s only by careful sharing of information that security can be improved. This dichotomy can lead to tensions in the cyber security world, and the occasional holding back of information regarding some vulnerabilities.
The organisations described throughout this chapter all have excellent websites, so rather than repeating their content, a brief description of their activities has been provided with links to the appropriate web pages.
The most ...