3 ingredients of a successful attack

The field of computer security has been around since the 1960s, and since then, practitioners have developed “a good understanding of the threat and how to manage it,” say the authors of Security in Computing, 5th edition.

But over the years the field has also developed a language of its own, which can present a challenge to newcomers.

In the preface to the updated edition of this classic text, the authors make plain their intent to demystify the language of computer security. One good place to start: understanding the three things a malicious attacker needs to be successful.

To read this article in full or to leave a comment, please click here

(Insider Story)
3 ingredients of a successful attack