O'Reilly logo

Cyber Security: A practitioner's guide by David Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4 CYBER VULNERABILITIES AND IMPACTS

Anything that thinks logically can be fooled by something else that thinks at least as logically as it does.

Douglas Adams, The Hitchhiker’s Guide to the Galaxy Trilogy

In this chapter, we shall examine the reasons why cyber-attacks succeed – cyber vulnerabilities – and the damage or consequences that can result from a successful attack – the impacts. These include policy, process and procedure vulnerabilities, technical vulnerabilities, people-related vulnerabilities, physical and environmental vulnerabilities; personal impacts and organisational impacts.

CYBER VULNERABILITIES

Any weakness that can be exploited to mount an attack on a network, system or service is termed a vulnerability.

Whilst we may be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required