This chapter reviews three well-known attacks and identifies some of the referenced controls that could have been implemented to prevent or reduce the impact of these attacks. The case studies describe the incidents based on reports, interviews, or official investigations. Each attack differs in its nature, and the suggested controls were based on the reviewed information for each case, not meaning that other controls could have been applied.
The cases are chosen not because they were the most impacting ones ...