Anything that thinks logically can be fooled by something else that thinks at least as logically as it does.
Douglas Adams, The Hitchhiker’s Guide to the Galaxy Trilogy
In this chapter, we shall examine the reasons why cyber-attacks succeed – cyber vulnerabilities – and the damage or consequences that can result from a successful attack – the impacts. These include policy, process and procedure vulnerabilities, technical vulnerabilities, people-related vulnerabilities, physical and environmental vulnerabilities; personal impacts and organisational impacts.
Any weakness that can be exploited to mount an attack on a network, system or service is termed a vulnerability.
Whilst we may be ...