COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Threat
|
|
File
|
|
Option
|
|
Loop
|
Detailed explanation-1: -Threat: A possible danger (circumstance, capability, action or event) that might exploit a vulnerability and cause harm.
Detailed explanation-2: -Risk is defined as the potential for loss or damage when a threat exploits a vulnerability. Examples of risk include: Financial losses. Loss of privacy.
Detailed explanation-3: -Likelihood is the chance or probability that a specific threat will exploit a specific vulnerability.
Detailed explanation-4: -A cybercriminal exploiting a vulnerability can perform various malicious actions, such as installing malicious software (malware), running malicious code, and stealing sensitive data. Common exploitation techniques include SQL injection (SQLi), cross-site scripting (XSS), and buffer overflow.