There can be various kinds of such weaknesses in a system which we shall be discussing further. Attackers use various techniques to exploit these different types of vulnerabilities to their advantage.
The causes that could give rise to of such weaknesses include the complexity of the software, connectivity, password management flaws, OS design flaws, software bugs, unchecked user input points, and more.
Vulnerability and risk are often incorrectly used interchangeably. Risk can be defined as the potential of some significant impact resulting from the exploit of a vulnerability.
Comments
Post a Comment