FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which security term is used to describe a weakness in a system, or its design, that could be exploited by a threat?
A
Vulnerability
B
Asset
C
Risk
D
Mitigation
Explanation: 

Detailed explanation-1: -Definition(s): Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

Detailed explanation-2: -A Security Vulnerability is a weakness, flaw, or error found within a security system that has the potential to be leveraged by a threat agent in order to compromise a secure network.

Detailed explanation-3: -A vulnerability refers to a known weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.

Detailed explanation-4: -A vulnerability is a weakness that can be exploited by an attacker. Thus, a weakness is an error, typically in the software code, that might lead to a vulnerability. This happens when it can be exploited.

Detailed explanation-5: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

There is 1 question to complete.