Threats and Vulnerabilities Flashcards
SECTION 3
Anything that could cause harm, loss, damage, or compromise to our information
technology systems
Threat
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information
Threat that can come from the following
Any weakness in the system design or implementation
Vulnerability
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Vulnerability that can come from internal factors like the following
Where threats and vulnerabilities intersect
Where the risk to your enterprise
systems and networks lies
If you have a threat, but there is no matching vulnerability to it, then you have no
risk
TRUE
The same holds true that if you have a vulnerability but there’s no threat against
it, there would be no risk
TRUE
Finding different ways to minimize the likelihood of an outcome and achieve the
desired outcome
Risk Management