Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
208 Security De-engineering
incidents database to corroborate the Hacker’s story. In this case, the
decision maker owes it to the organization to go with the Hacker.
If there is an easily exploitable vulnerability, it goes without saying
that if there is a serious associated business risk, the risk needs to be
adjusted to an acceptable level, and just because there is no prior his-
tory of that vulnerability ever having been exploited, this fact should
not weigh in favor of sweeping the issue under the carpet.
Many have proposed an incidents database that also records the
nancial impact that came with a specic vulnerability exploit (and
again, how does an organization measure this?). e problem is that
corporate business models and networks ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355