Computer security
Computer security
!An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering.
Vulnerabilities and attacks
A vulnerability refers to a flaw in the structure, execution, functioning, or internal oversight of a computer or system that compromises its security. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures (CVE) database. An exploitable vulnerability is one for which at least one working attack or exploit) exists. Actors maliciously seeking vulnerabilities are known as threats). Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using automated tools or customized scripts.
Vulnerabilities and attacks
Various people or parties are vulnerable to cyber attacks; however, different groups are likely to experience different types of attacks more than others.