Vulnerability (computing) in the context of Confidentiality


Vulnerability (computing) in the context of Confidentiality

Vulnerability (computing) Study page number 1 of 1

Play TriviaQuestions Online!

or

Skip to study material about Vulnerability (computing) in the context of "Confidentiality"


⭐ Core Definition: Vulnerability (computing)

In computer security, vulnerabilities are flaws or weaknesses in a system's design, implementation, or management that can be exploited by a malicious actor to compromise its security.

Despite a system administrator's best efforts to achieve complete correctness, virtually all hardware and software contain bugs where the system does not behave as expected. If the bug could enable an attacker to compromise the confidentiality, integrity, or availability of system resources, it can be considered a vulnerability. Insecure software development practices as well as design factors such as complexity can increase the burden of vulnerabilities.

↓ Menu
HINT:

In this Dossier

Vulnerability (computing) in the context of Threat (security)

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event (incident is often used as a blanket term). A threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. An exploit is a vulnerability that a threat actor used to cause an incident.

View the full Wikipedia page for Threat (security)
↑ Return to Menu