09121423 - Master IT Training Book

9/11/23

There are different types of vulnerabilities, we can sum them up generally as:

u Technical vulnerabilities , like bugs in code or an error in some hardware or software. u Human vulnerabilities , such as employees falling for phishing, smishing or other common attacks.

7

What is a threat?

u In cybersecurity, the most common definition of a threat is this: u Anything that could exploit a vulnerability, which could affect the confidentiality, integrity or availability of your systems, data, people and more. (Confidentiality, integrity and availability, sometimes known as the CIA triad, is another fundamental concept of cybersecurity.)

8

4

Made with FlippingBook - Online catalogs