Penetrating the Infrastructure A security incident often starts with a flaw in a application, which an attack can take advantage of. These exploits might involve viruses, bypassing firewalls, or a more sophisticated attack. Robust prevention requires constant vulnerability assessment and an incident response plan ready to be deployed if a compromis