4 CYBER VULNERABILITIES AND IMPACTS

Anything that thinks logically can be fooled by something else that thinks at least as logically as it does.

Douglas Adams, The Hitchhiker’s Guide to the Galaxy Trilogy

In this chapter, we shall examine the reasons why cyber-attacks succeed – cyber vulnerabilities – and the damage or consequences that can result from a successful attack – the impacts. These include policy, process and procedure vulnerabilities, technical vulnerabilities, people-related vulnerabilities, physical and environmental vulnerabilities; personal impacts and organisational impacts.

CYBER VULNERABILITIES

Any weakness that can be exploited to mount an attack on a network, system or service is termed a vulnerability.

Whilst we may be ...

Get Cyber Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.