Page 642 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 642
Unfortunately, no security mechanism is perfect. Each individual
security mechanism has a flaw or a workaround just waiting to be
discovered and abused by a hacker.