Difference between revisions of "Vulnerability"
(Created page with "'''Content coming soon'''") |
m |
||
Line 1: | Line 1: | ||
− | + | A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack. They can occur through flaws, features or user error, and attackers will look to exploit any of them, often combining one or more, to achieve their end goal. <ref>[https://www.ncsc.gov.uk/information/understanding-vulnerabilities Understanding vulnerabilities]</ref> | |
+ | |||
+ | |||
+ | |||
+ | ==See Also== | ||
+ | *[[Cyber Security]] | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | ==References== | ||
+ | <references /> |
Revision as of 02:29, 23 December 2022
A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack. They can occur through flaws, features or user error, and attackers will look to exploit any of them, often combining one or more, to achieve their end goal. [1]
See Also