What terms represents the leveraging of a security weakness present in a system?

Last Updated on August 1, 2021 by Admin 2

What terms represents the leveraging of a security weakness present in a system?

  • breach
  • threat
  • vulnerability
  • exploit
Explanation:
When a security weakness or vulnerability exists in a system and threat actor takes advantage of it, the attack is considered an exploit.

A vulnerability is a susceptibility to a threat that exists in a system. An example of a vulnerability is keeping ports open for nonessential services.

A threat is an external danger to which a system may or may not be vulnerable. It is a potential danger that could take advantage of a system if it is vulnerable. A hacker is a threat actor. An attacker picking the lock of the back entrance to a facility is an example of a threat, not a vulnerability.

A breach is when an exploit is successful in providing unauthorized access to data.

Objective: Security Concepts
Sub-Objective: Compare and contrast these concepts: Risk, Threat, Vulnerability, Exploit

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments