Addressing challenges of security risk management in computer security
An asset that is given low priority today because the chance of an attack on it is very low, can result to a potential exploit in the future, once attackers find a way to use that asset. An attacker can penetrate the security system of a trusted third party, and either steal data from them β