4 CYBER VULNERABILITIES AND IMPACTS

In this chapter, we shall examine the reasons why cyber-attacks succeed – cyber vulnerabilities. These include policy, process and procedure vulnerabilities, technical vulnerabilities, people-related vulnerabilities, and physical and environmental vulnerabilities. We will also consider the damage or consequences that can result from a successful attack – cyber impacts. These include personal impacts and organisational impacts.

CYBER VULNERABILITIES

Any weakness that can be exploited to mount an attack on a network, system or service is termed a vulnerability.

While we may be unable to take preventative action to ward off threats and hazards, vulnerabilities are things that we can often take steps to reduce ...

Get Cyber Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.