The exploitation of vulnerable systems is a significant attack vector for both intruders and malicious code. Steven Furnell examines the challenge of vulnerability management, and the possible overheads even if trying to take a responsible stance. He also considers cases in which exposure is heightened by continuing to use vulnerable technologies that cannot be adequately secured.
The session was part of Secure South West 4, at Plymouth University on 10 July 2014.
[(CC) BY-NC-SA 2.0 UK]