4 CYBER VULNERABILITIES AND IMPACTS
Anything that thinks logically can be fooled by something else that thinks at least as logically as it does.
Douglas Adams, The Hitchhiker’s Guide to the Galaxy Trilogy
In this chapter, we shall examine the reasons why cyber-attacks succeed – cyber vulnerabilities – and the damage or consequences that can result from a successful attack – the impacts. These include policy, process and procedure vulnerabilities, technical vulnerabilities, people-related vulnerabilities, physical and environmental vulnerabilities; personal impacts and organisational impacts.
CYBER VULNERABILITIES
Any weakness that can be exploited to mount an attack on a network, system or service is termed a vulnerability.
Whilst we may be ...
Get Cyber Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.