12. Return on Investment: Business Justification
There is no such thing as a truly secure system. With enough time, resources, and determination on the part of a malicious attacker, not to mention human error, any system can be breached, including government and military networks. In the adversarial world of security, you are challenged by a constantly moving malicious opponent target. As you study your adversaries’ strategies, they study yours. They parry and counter your every move, so a majority of malicious attackers are never more than a half-step behind you, whereas the remaining minority are even more sophisticated. They create zero-day exploits and remain slightly ahead of the white hat security community.
The primary goal of a company’s ...
Get Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.