Vulnerability is a weakness which can be exploited by a cyber attack to gain unauthorized access

Created Date : 25-09-2020

Created by : Annamalai

Cyber vulnerabilities :

In cyber security, a vulnerability is a weakness which can be exploited by a cyber attack to gain unauthorized access to or perform unauthorized actions on a computer system. Vulnerabilities can allow attackers to run code, access a system's memory, install malware, and steal, destroy or modify sensitive data.

The 4 Types of Vulnerabilities Found in Great Men

  • - Physical Vulnerability

  • - Economic Vulnerability

  • - Social Vulnerability

  • - Emotional Vulnerability

Will cyber vulnerabilities ever go away?

Or one person could steal another's identity by guessing, cracking, or extracting a password. Vulnerabilities such as these will never completely go away, because they're built into the internet's very architecture.

Example for vulnerability

Vulnerability is a weakness or some area where you are exposed or at risk. If you are running for political office and you don't want anyone to find out about a scandal in your past, the scandal is an example of a vulnerability.

Common Computer Security Vulnerabilities:

  • Bugs

  • Weak passwords

  • Software that is already infected with virus

  • Missing data encryption

  • OS command injection

  • SQL injection

  • Buffer overflow

  • Missing authorization

1. Personal vulnerability – results from an individual or group‟s characteristics, identity or status. In effect, there are certain individual characteristics that shape susceptibility to being negatively affected by a victimisation experience. For example, mental or physical health status.

Hackers hack because they can. ... Hacking is a casual hobby for some hackers — they hack just to see what they can and can't break into, usually testing only their own systems. Some are obsessive about gaining notoriety or defeating computer systems, and some have criminal intentions.

What is a threat vs vulnerability?

Threat is what an organization is defending itself against, e.g. a DoS attack. Vulnerabilities are the gaps or weaknesses that undermine an organization's IT security efforts, e.g. a firewall flaw that lets hackers into a network.

What are emotional vulnerabilities?

Emotional vulnerability is putting yourself out there, intentionally or unintentionally. Showing a part of yourself that you may feel sensitive about, exposing something that makes you feel seen by others. Like think about the last time you were emotionally vulnerable with someone.

Why does the vulnerability exist?

In the world of cyber security, vulnerabilities are unintended flaws found in software programs or operating systems. Vulnerabilities can be the result of improper computer or security configurations and programming errors. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit.

The most common software security vulnerabilities include:

  • Missing data encryption.

  • OS command injection.

  • SQL injection.

  • Buffer overflow.

  • Missing authentication for critical function.

  • Missing authorization.

  • Unrestricted upload of dangerous file types.

  • Reliance on untrusted inputs in a security decision.

4 views0 comments

Recent Posts

See All

© 2020 by