Chapter 5. ‘Traditional’ Threats
Executive summary
All organizations face a range of threats that have been around – and getting progressively worse – for a number of years. Few organizations have taken adequate steps to deal with them. A conclusion of the CBI Cybercrime Survey 2001 was that ‘deployment of technologies such as firewalls may provide false levels of comfort unless organizations have performed a formal risk analysis and configured firewalls and security mechanisms to reflect their overall risk strategy.’
Unless the organization actually has a risk strategy, it’s not going to be able to ensure that its cyber defences will meet its requirements.
Viruses and hackers
The magazine Information Security carried out an online survey of 2,545 ...
Get The Case for ISO 27001 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.