Threats and Vulnerabilities

  • Campbell T
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The sophistication and capability of cybercriminals is greater today than it has ever been, with technically superior threat actors researching and developing insidious malware frameworks that allow them or their customers to break into their victims' systems, maintaining access, covering their tracks, evading countermeasures and siphoning gigabytes of confidential information off for sale on the black market.

Cite

CITATION STYLE

APA

Campbell, T. (2016). Threats and Vulnerabilities. In Practical Information Security Management (pp. 15–29). Apress. https://doi.org/10.1007/978-1-4842-1685-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free