This blog contains notes from different learning sites. This notes falls in Information Security, Cyber Security, Network Security and other Security Domain class. Any suggestion to make this site helpful is truly welcome :)
Showing posts with label Threat. Show all posts
Showing posts with label Threat. Show all posts
Tuesday, January 8, 2019
Tuesday, July 5, 2016
Threat, Vulnerability and Countermeasure
Understanding current threats
Now you know what information assets you have, you’ll look at how those assets can be compromised.
You will learn about some different kinds of threat, the vulnerabilities that they exploit and some countermeasures that can be put in place to guard against them. When we use those terms we mean:
New threats are being discovered all the time and they can affect any and every operating system, including Windows, Mac OS, Linux, Android and iOS. To protect ourselves it is important to keep ourselves up to date with the latest cyber security news.

Now you know what information assets you have, you’ll look at how those assets can be compromised.
You will learn about some different kinds of threat, the vulnerabilities that they exploit and some countermeasures that can be put in place to guard against them. When we use those terms we mean:
- Vulnerability – a point at which there is potential for a security breach
- Threat – some danger that can exploit a vulnerability
- Countermeasure – action you take to protect your information against threats and vulnerabilities.
New threats are being discovered all the time and they can affect any and every operating system, including Windows, Mac OS, Linux, Android and iOS. To protect ourselves it is important to keep ourselves up to date with the latest cyber security news.

Wednesday, April 22, 2015
Information Security - Threat and Attack
Threat: A potential for violation of security, which exists when there is a
circumstance, capability, action, or event that could breach security and cause
harm. That is, a threat is a possible danger that might exploit vulnerability.
Attack: An assault on system security that derives from an intelligent threat.
That is, an intelligent act that is a deliberate attempt (especially in the
sense of a method or technique) to evade security services and violates the
security policy of a system.
Subscribe to:
Posts (Atom)