Last Updated on August 1, 2021 by Admin 2
What terms represents the leveraging of a security weakness present in a system?
- breach
- threat
- vulnerability
- exploit
Explanation:
When a security weakness or vulnerability exists in a system and threat actor takes advantage of it, the attack is considered an exploit.
When a security weakness or vulnerability exists in a system and threat actor takes advantage of it, the attack is considered an exploit.
A vulnerability is a susceptibility to a threat that exists in a system. An example of a vulnerability is keeping ports open for nonessential services.
A threat is an external danger to which a system may or may not be vulnerable. It is a potential danger that could take advantage of a system if it is vulnerable. A hacker is a threat actor. An attacker picking the lock of the back entrance to a facility is an example of a threat, not a vulnerability.
A breach is when an exploit is successful in providing unauthorized access to data.
Objective: Security Concepts
Sub-Objective: Compare and contrast these concepts: Risk, Threat, Vulnerability, Exploit
Subscribe
Login
0 Comments