Skip to main content

Threats and Vulnerabilities

  • Chapter
  • First Online:
Practical Information Security Management
  • 2412 Accesses

Abstract

The sophistication and capability of cybercriminals is greater today than it has ever been, with technically superior threat actors researching and developing insidious malware frameworks that allow them or their customers to break into their victims’ systems, maintaining access, covering their tracks, evading countermeasures and siphoning gigabytes of confidential information off for sale on the black market.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Tony Campbell

About this chapter

Cite this chapter

Campbell, T. (2016). Threats and Vulnerabilities. In: Practical Information Security Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1685-9_2

Download citation

Publish with us

Policies and ethics