The challenge in making the business case for network security is in harnessing the abundance of data on hacking and breaches and turning it into objective matter. The business case is not built merely on revenue output, either positive or negative, nor is its foundation built on a bevy of fears. Rather, it is a melding of many divergent factors that ultimately forms the basis with which one can begin to carve out concrete numbers. This chapter begins the process by focusing on hackers and threats.
This chapter covers the following topics:
• Contending with vulnerability
• Analyzing hacking
• Threats classification
• The future of hacking and security
Type security breach into any search ...