CHAPTER 5

Vulnerabilities and Threats

Now that we’ve covered some of the theory and understood the issues at stake, the types of asset that can be affected, together with the possible impacts, we can continue by examining the vulnerabilities that can permit many of these threats to occur, and then move on to the main threats that can be the cause of cyber issues.

Business Continuity Cyber Vulnerabilities

Vulnerabilities are weaknesses in assets that can be exploited by threats. Typical examples would be little or no access control in computer systems, or poor physical security at the organization’s buildings.

It is not unreasonable to imagine that most vulnerabilities are of a technical nature, but this is actually far from correct. It is true ...

Get Business Continuity in a Cyber World now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.