Penetrating the Infrastructure A security incident often starts with a weakness in a system, which an attack can leverage. These exploits might involve viruses, bypassing security measures, or a more sophisticated intrusion. Robust prevention requires constant risk assessment and an security response plan ready to be deployed if a breach does occur