A threat is a person or event with the potential for negatively impacting valuable assets. Although a variety of cyber threats may exist at any given time, threats themselves symbolize the possibility of an attack occurring, rather than the actual attack itself.
A vulnerability is an inherent defect in a network, software, or system’s design that can be exploited by threat actors to damage, steal, or prevent access to assets. The most common types of vulnerabilities include system misconfigurations, out-of-date or unpatched software, missing or weak authorization credentials, missing or poor data encryption, and zero-day vulnerabilities (which are defined below).
An exploit is a method threat actors use to take advantage of a vulnerability. It might include software, data, or commands that manipulate the vulnerability so the threat actor is free to perform unwanted or unauthorized actions.
A web application attack occurs when vulnerabilities in web applications allow threat actors to gain unauthorized access to sensitive data residing on a database server. The most common types of web application attacks are:
Nanjgel CSMS – SOC AS A SERVICE powered by NANJGEL SOLUTIONS