Threat: A threat is
an environment or situation that could lead to a potential
breach of security. Ethical hackers look for and
prioritize threats when
performing a security analysis.
An Exploit:
An exploit is a piece of software that takes advantage of a bug,
glitch, or vulnerability, leading to unauthorized
access, privilege escalation, or
denial of service on a computer system.
Vulnerability:
A vulnerability is an existence of a software flaw, logic design,
or implementation error that can lead to an
unexpected and undesirable
event executing bad or damaging instructions to
the system. In easy word
vulnerability is weakness in system.
Payload: Payload is
agent that helps in taking advantage of vulnerability in
remote hacking.
Attack: An attack
occurs when a system is compromised based on a vulnerability.
No comments:
Post a Comment