Concepts

A vulnerability is any potential weakness that can compromise the CIA of a system/info.

  • A potential weakness isn't a problem on its own.

An exploit is something that can potentially be used to exploit the vulnerability.

  • Something that can potentially be used as an exploit isn't a problem on it's own.

A threat is the potential of a vulnerability to be exploited.

  • A hacker exploiting a vulnerability in your system is a threat.

A mitigation technique is something that can protect against threats.

  • Should be implemented everywhere a vulnerability can be exploited: client devices, servers, switches, routers, firewalls, etc.

Last updated