Abstract
Breaches occur because vulnerabilities are exploited. It does not mean attackers used complex, undetectable zero-day exploits to compromise a system and exfiltrate data. It does mean that a weakness existed, an attacker took advantage of it, and the activities went undetected. A successful breach against an organization also does not always mean incompetence or negligence was the root cause. Sometimes organizations with mature processes and talented staff suffer breaches. Sometimes there are just too many variables and too much noise.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Eric C. Thompson
About this chapter
Cite this chapter
Thompson, E.C. (2020). Vulnerability Management. In: Designing a HIPAA-Compliant Security Operations Center. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5608-4_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5608-4_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5607-7
Online ISBN: 978-1-4842-5608-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books