Introduction to Computer Hacking

Ensuring that a system is free from vulnerabilities is a constant challenge; even more so in large, complex computing environments that depend on a myriad of software and hardware configurations. However, IT security professionals and hackers alike can leverage and exploit system vulnerabilities.
One resource to search for common vulnerabilities is the CVE website, which contains a collection of common vulnerabilities and exposures.
After reviewing the CVE site, discuss the importance of detecting and protecting against system or software vulnerabilities. Also, discuss how hackers exploit system and software vulnerabilities to conduct an attack. What kinds of organizations do you think are most at risk of being attacked? Why?
In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks.