3 ingredients of a successful attack

What we mean when we talk about method, opportunity and motive.

arrows target attack

The field of computer security has been around since the 1960s, and since then, practitioners have developed "a good understanding of the threat and how to manage it," say the authors of Security in Computing, 5th edition.

But over the years the field has also developed a language of its own, which can present a challenge to newcomers.

In the preface to the updated edition of this classic text, the authors make plain their intent to demystify the language of computer security. One good place to start: understanding the three things a malicious attacker needs to be successful.

Register now to download Chapter 1 of Security in Computing and learn more about the how, when and why of successful attacks.

To continue reading this article register now

7 hot cybersecurity trends (and 2 going cold)