1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Different Types of Computer and/or System
A diverse range of computer systems, each exposed to various cybersecurity threats and vulnerabilities.
Network Vulnerabilities
Weaknesses within an organization's network infrastructure, including issues like open firewall ports and vulnerabilities associated with external storage devices.
Organizational Vulnerabilities
Weaknesses originating from within the organization, including problems related to file permissions, privileges, and password policies.
Software Vulnerabilities
Weaknesses in software components, such as those arising from downloading software from untrustworthy sources or using illegal copies.
Operating System Vulnerabilities
Vulnerabilities related to the organization's operating systems, which may stem from running unsupported versions or failing to install essential updates.
Mobile Device Vulnerabilities
Vulnerabilities found in mobile devices that rely on Original Equipment Manufacturers (OEMs) for system software updates.
Physical Vulnerabilities
Weaknesses involving physical access, such as the theft of equipment, USB storage devices with sensitive data, or the collection of passwords and other information through social-engineering techniques.
Process of How People Use the System
Vulnerabilities that emerge from the ways individuals interact with the system, including leaks and the improper sharing of security details.
Security Implications of Cloud Computing and IoT Devices
Considerations for security in the context of cloud computing and Internet of Things (IoT) devices.
Up-to-Date Sources of Information on Specific Known Hardware and Software Vulnerabilities
Reliable resources that provide current information about identified vulnerabilities in hardware and software.
Attack Vectors
Various pathways through which systems can be targeted, including Wi-Fi, Bluetooth, internet connections, and internal network access.