- Target of Evaluation
An IT system, product, or component that is identified to require security evaluation.
- Vulnerability
Existence of a weakness, design, or implementation error that can lead to an unexpected and undesirable event compromising the security of the system.
- Threat
An action or event that might compromise security. A threat is a potential violation of security.
- Attack
An assault on the system security that is derived from an intelligent threat. An attack is any action that violates security.
- Exploit
A defined way to breach the security of an IT system through vulnerability.
Subscribe to:
Post Comments (Atom)
0 komentar:
Post a Comment