Exploits
Consider this scenario: a malicious attacker may try to crack a password database and then use the results to gain unauthorized access into computer systems. What action this person is doing?
Vulnerability
Exploration
Risk
Exploitation
Understanding Threats
Which of the following can be considered cybersecurity threats? (Pick all that apply)
Weak password
Disgruntled Employee
User error
Hackers
Cloud computing
Next Concept