Abstract
The sophistication and capability of cybercriminals is greater today than it has ever been, with technically superior threat actors researching and developing insidious malware frameworks that allow them or their customers to break into their victims’ systems, maintaining access, covering their tracks, evading countermeasures and siphoning gigabytes of confidential information off for sale on the black market.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Tony Campbell
About this chapter
Cite this chapter
Campbell, T. (2016). Threats and Vulnerabilities. In: Practical Information Security Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1685-9_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1685-9_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1684-2
Online ISBN: 978-1-4842-1685-9
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books