Questions and Answers
What is a vulnerability in the context of information security?
A weakness that could be exploited by a threat source
How do vulnerabilities leave systems susceptible?
To a multitude of activities that can result in significant losses
What type of threat source can exploit system vulnerabilities?
Adversarial and non-adversarial
What do adversarial threat sources seek to exploit?
Signup and view all the answers
Who can be known to defraud organizational systems?
Signup and view all the answers