CIS 442: Chapter 5 Prevention and Defense. Understanding vulnerabilities Examples of vulnerabilities or weaknesses: User apathy Insufficient security.
Andreas Kaltsounis Sherry Johnson Computer Forensics, Crime & Investigators October 6, 2010 2010 Organization of Bar Investigators Conference.