Created Date : 25-09-2020
Created by : Annamalai
Cyber vulnerabilities :
In cyber security, a vulnerability is a weakness which can be exploited by a cyber attack to gain unauthorized access to or perform unauthorized actions on a computer system. Vulnerabilities can allow attackers to run code, access a system's memory, install malware, and steal, destroy or modify sensitive data.
The 4 Types of Vulnerabilities Found in Great Men
- Physical Vulnerability
- Economic Vulnerability
- Social Vulnerability
- Emotional Vulnerability
Will cyber vulnerabilities ever go away?
Or one person could steal another's identity by guessing, cracking, or extracting a password. Vulnerabilities such as these will never completely go away, because they're built into the internet's very architecture.
Example for vulnerability
Vulnerability is a weakness or some area where you are exposed or at risk. If you are running for political office and you don't want anyone to find out about a scandal in your past, the scandal is an example of a vulnerability.
Common Computer Security Vulnerabilities:
Software that is already infected with virus
Missing data encryption
OS command injection
1. Personal vulnerability – results from an individual or group‟s characteristics, identity or status. In effect, there are certain individual characteristics that shape susceptibility to being negatively affected by a victimisation experience. For example, mental or physical health status.
Hackers hack because they can. ... Hacking is a casual hobby for some hackers — they hack just to see what they can and can't break into, usually testing only their own systems. Some are obsessive about gaining notoriety or defeating computer systems, and some have criminal intentions.
What is a threat vs vulnerability?
Threat is what an organization is defending itself against, e.g. a DoS attack. Vulnerabilities are the gaps or weaknesses that undermine an organization's IT security efforts, e.g. a firewall flaw that lets hackers into a network.
What are emotional vulnerabilities?
Emotional vulnerability is putting yourself out there, intentionally or unintentionally. Showing a part of yourself that you may feel sensitive about, exposing something that makes you feel seen by others. Like think about the last time you were emotionally vulnerable with someone.
Why does the vulnerability exist?
In the world of cyber security, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can be the result of improper computer or security configurations and programming errors. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit.
The most common software security vulnerabilities include:
Missing data encryption.
OS command injection.
Missing authentication for critical function.
Unrestricted upload of dangerous file types.
Reliance on untrusted inputs in a security decision.