A2

A2 Keywords:

  • Different Types of Computer and/or System: A diverse range of computer systems, each exposed to various cybersecurity threats and vulnerabilities.

  • Network Vulnerabilities: Weaknesses within an organization's network infrastructure, including issues like open firewall ports and vulnerabilities associated with external storage devices.

  • Organizational Vulnerabilities: Weaknesses originating from within the organization, including problems related to file permissions, privileges, and password policies.

  • Software Vulnerabilities: Weaknesses in software components, such as those arising from downloading software from untrustworthy sources or using illegal copies.

  • Operating System Vulnerabilities: Vulnerabilities related to the organization's operating systems, which may stem from running unsupported versions or failing to install essential updates.

  • Mobile Device Vulnerabilities: Vulnerabilities found in mobile devices that rely on Original Equipment Manufacturers (OEMs) for system software updates.

  • Physical Vulnerabilities: Weaknesses involving physical access, such as the theft of equipment, USB storage devices with sensitive data, or the collection of passwords and other information through social-engineering techniques.

  • Process of How People Use the System: Vulnerabilities that emerge from the ways individuals interact with the system, including leaks and the improper sharing of security details.

  • Security Implications of Cloud Computing and IoT Devices: Considerations for security in the context of cloud computing and Internet of Things (IoT) devices.

  • Up-to-Date Sources of Information on Specific Known Hardware and Software Vulnerabilities: Reliable resources that provide current information about identified vulnerabilities in hardware and software.

  • Attack Vectors: Various pathways through which systems can be targeted, including Wi-Fi, Bluetooth, internet connections, and internal network access.