term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
Threat
Potential for violation of security, which exists when there is a circumstances, capacity, actions or event that could breach security
Vulnerability
A flaw or weakness in systems design, implementation or operation and management that could be exploited to violate the systems security policy.
Exploit
A means (software, tools or technique) of exploiting a weakness or vulnerability in a system to violate the security
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!