Chapter 11


Securing legacy systems is like trying to put rebar into Jello without changing its appearance or flavor.


In The Lord of the Rings: The Two Towers, a dramatic battle between good and evil occurs at Helm’s Deep. The bad guys (orcs and their allies) breach the fortress of defense by blowing a hole in a vulnerable spot. The drain is the only weakness in the solid rock outer wall. Once the orcs blow the hole, the citadel is taken.1

1. Until Gandalf shows up to save the day with the Rohirrim incident response team!

A vulnerability is something susceptible to harm. Exploiting that vulnerability allows an attacker to violate a security policy. The security policy for Helm’s Deep was “Do not let anyone in.” That vulnerability ...

Get Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.