3 ingredients of a successful attack

What we mean when we talk about method, opportunity and motive.

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

The field of computer security has been around since the 1960s, and since then, practitioners have developed "a good understanding of the threat and how to manage it," say the authors of Security in Computing, 5th edition.

But over the years the field has also developed a language of its own, which can present a challenge to newcomers.

In the preface to the updated edition of this classic text, the authors make plain their intent to demystify the language of computer security. One good place to start: understanding the three things a malicious attacker needs to be successful.

Register now to download Chapter 1 of Security in Computing and learn more about the how, when and why of successful attacks.

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.