Computer security

Computer security

!An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering.


Vulnerabilities and attacks

A vulnerability refers to a flaw in the structure, execution, functioning, or internal oversight of a computer or system that compromises its security. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures (CVE) database. An exploitable vulnerability is one for which at least one working attack or exploit) exists. Actors maliciously seeking vulnerabilities are known as threats). Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using automated tools or customized scripts.


Vulnerabilities and attacks

Various people or parties are vulnerable to cyber attacks; however, different groups are likely to experience different types of attacks more than others.

WikTok | Your Personalised Encyclopedia

Train your feed. Demystify any topic with AI. Read with friends.

Follow what fascinates you, crack open any topic with AI, save favourites, share great finds, and level up as you go.

Swipe left and right to improve your feed!