The sophistication and capability of cybercriminals is greater today than it has ever been, with technically superior threat actors researching and developing insidious malware frameworks that allow them or their customers to break into their victims' systems, maintaining access, covering their tracks, evading countermeasures and siphoning gigabytes of confidential information off for sale on the black market.
CITATION STYLE
Campbell, T. (2016). Threats and Vulnerabilities. In Practical Information Security Management (pp. 15–29). Apress. https://doi.org/10.1007/978-1-4842-1685-9_2
Mendeley helps you to discover research relevant for your work.