Abstract
The information technology we rely upon is a tremendous enabler and also… imperfect. Unplanned exceptions exist in the underlying and interconnected technology, deviating its actual functionality away from the ideal. These imperfections expose attractive perforations perfectly accommodating for an unintended user. This is the problem of cybersecurity.
Introduction
It all starts at the ...