What are the differences between threat, vulnerability, and consequence in the context of cybersecurity?

1 Answer

Answer :

Those are academic terms, or possibly professional cybersecurity lingo. I’m a software developer, but have only done a few projects in cybersecurity, and I don’t follow the academic or industry terminology very closely. However, I would say: Vulnerability – any potential way in which a system could be used in a way its owners don’t want, and would prefer not to be possible. It includes ways an unauthorized person or program could take more control of the system than the owner wants, to access or alter the data or programs, cause damage, etc. It includes physical and social aspects, electronic and programming aspects, etc. Consequence – Any undesired outcome that actually happens from a Vulnerability. i.e. The system crashes because someone used it in a way the owner wishes weren’t possible. Or someone accessed and/or modified data the owner intended to be inaccessible. Or a program infected the system with viruses and sent a million spam emails and launched a DOS attack. Or someone bribed or seduced an admin and stole some passwords. Or someone broke into the server room and stole the hard drive. Threat – I don’t know for sure what they mean, but probably people, organizations, or software that may tend to actually take action that would use a Vulnerability to cause a Consequence. Could be a hacker or spy or burglar. Could be a virus or malicious or badly-designed software such as Microsoft Update, or a DDOS attack. Could be ignorant users who don’t know what they’re doing.

Related questions

Description : Are corporations and goverment agencies helpless against hackers for ransom?

Last Answer : If they can get through the Anti-virus programs and the firewalls then yup.

Description : IF 2016 presidential found invalid, what's up legally?

Last Answer : Well, I would assume we’d then fire the asshole who never should have won in the first place, and proceed from there.

Description : I am hacked and need some help!

Last Answer : You might want to either take it to a repair shop or pay someone to come to your home to check it out connected to your service provider. It's NOT going to be cheap; but what you're ... hacker who might love the challenge of figuring out what your hackers are doing & enjoy shutting them down!!!

Description : In which scenarios fraudulent credit card transaction may not be reversed?

Last Answer : One scenario is when you child makes an online purchase on your credit card.

Description : So what finally happened with/to the Ashley Madison site?

Last Answer : Probably someone got paid off via an off shore account and now it’s business as usual.

Description : Can they bug our cellphones like that?

Last Answer : answer:Possible? Yes. Does it happen? Probably. Scared?

Description : Ashley Madison is a 'dating' site for married couples that want to cheat on their spouses. Apparently they have been hacked and the hacker is threatening to release all 37 million names, unless the site closes up shop. Is this good or bad?

Last Answer : While I don’t condone what people do on that site. I find it weird that our right wing friends say we all have a free will to go through life with, yeah sure as long as it meets their views,if it doesn’t then they will force theirs on you, pretty cool huh?

Description : Someone hacked my facebook?

Last Answer : You can change your password if you can answer the secret question. You can’t change the secret answer. You might have to make another account. Best to tell all you your contacts not to send you any money and that to be careful with your old (hacked) account.

Description : A question for Computer Scientists: How feasible is an "offensive firewall"?

Last Answer : answer:Very feasible, you can fire off just about anything you want with existing firewalls and software for whatever conditions you want to look for. But it has the same risk/reward as any attack. You don’t get a pass for attacking a government network because they probed your network first.

Description : How to report hackers on Runescape?

Last Answer : answer:I believe there’s a contact link somewhere on the support site. If you can tell them your original password as proof that you really own the account they’ll probably give it back to you. I hope you have set a bank pin, so even if the hackers got your account, they can’t empty your bank.

Description : Can you "hack" an elevator, so that it will bypass "pickup calls"?

Last Answer : I remember reading this a while back (linked from lifehacker) but it hasn’t worked for me so far! http://www.i-hacked.com/content/view/186/48/ some good comments about whether it works on lifehacker http://lifehacker.com/205918/send-the-elevator-directly-to-your-floor

Description : Any idea of the repercussions if I attack a site that is hosting images of protesters in Iran and asking for their identity?

Last Answer : I don’t know, but if it is a site as you describe it to be, I would applaud you! (Best not to get caught, though and be proud in private – by yourself, knowing that I would be proud of you if I knew.)

Description : To snoop or not to snoop.

Last Answer : how old is she?

Description : Do you still have to remember usernames with "SuperGenPass"? what about password lenght requirements that are diff on diff sites, also: any alternatives you guys use that's 100% hacker safe?

Last Answer : answer:i just use the same…i don’t care that people see me on empornium etc. but ofcourse, everything will never be fully hackproof…

Description : ______was the first technique that posed a serious threat to virus scanners: a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These

Last Answer : b) Polymorphic Code

Description : There are four conditions that give rise to the need for independent audits of financial statements. One of these conditions is consequence. In this context, consequence means that the: a. ... fully understood by the users of the statements. d. Financial statements are used for important decisions

Last Answer : Financial statements are used for important decisions

Description : What is cybersecurity?

Last Answer : Cybersecurity is the practice of protecting computer systems and networks from unauthorized access, theft, and damage, and is an increasingly important field in today's digital age.

Description : Why is it important to educate the employees of an organization about cybersecurity?

Last Answer : In this fast-paced digital world, cybercriminals are making deliberate attempts to gain access to the sensitive information and login credentials by tricking the innocent employees to fall into their ... its employees. Well-trained and educated employees are the best defence against cyber attacks.

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : Their differences are often unannounced, Though the difference is quite pronounced, There may be no change in what you're going to hear, But your context will show you that they're here. What are they? -Riddles

Last Answer : Homophones.

Description : Which approach to speech recognition avoids the problem caused by the differences in the way words are pronounced according to context? a) continuous speech recognition b) connected word recognition c) isolated word recognition d) speaker-dependent recognition

Last Answer : c) isolated word recognition

Description : Is it bad to show your boss vulnerability?

Last Answer : answer:I have been a boss and I love nothing more than a person admitting they didn't know and then asking for help to avoid a similar situation in the future. I do prefer if you ask before ... Don't waste their time with your insecurities. Find the problem, fix the problem and move the fuck on.

Description : Are a vulnerability & a weakness the same thing?

Last Answer : answer:I have a weakness in my lower back do to congential abnormalities. I am vulnerable to friends asking for financial loans (when I know they will not repay me). I am vulnerable to cats and dogs ... remove two wasps who flew inside (by paper cup and lid and release them back into the outdoors).

Description : Is vulnerability strength or foolishness?

Last Answer : Emotional vulnerability is a sine qua non of a mature, loving relationship, and it is very rewarding, as well.

Description : vulnerability can be defined as -General Knowledge

Last Answer : Vulnerability can be defined as: the diminished capacity of an individual or group to anticipate, cope with, resist and recover from the impact of a natural or man-made hazard.

Description : What is meant by ‘ Vulnerability’ to poverty? Which economic categories are more vulnerable to poverty in India. -Economics 9th

Last Answer : Economic categories more vulnerable to poverty in India: Schedule tribes, urban casual labourers, rural agriculture labourers, scheduled castes are major economic groups, which are more vulnerable to poverty ... tribes contribute to 51% of poverty in India which average Indian poverty ratio is 26.

Description : What is the difference between vulnerability from hazards?

Last Answer : Need answer

Description : The primary goal of planning for disasters is to reduce – (1) Death (2) Damage (3) Risk (4) Vulnerability

Last Answer : (4) Vulnerability Explanation: Disaster planning is the creation of plans through which communities reduce vulnerability to hazards and cope with disasters. It does not avert or eliminate the threats; instead it focuses on creating plans to decrease the impact of disasters.

Description : Which zone is considered the highest vulnerability zone of the seismic zonation map of India? (a) Zone-IV (b) Zone-V (c) Zone-III (d) Zone-

Last Answer : (b) Zone-V

Description : High vulnerability and high hazard are associated with (a) Low disaster risk (b) Medium disaster risk (c) High disaster risk (d) None of these

Last Answer : (c) High disaster risk

Description : Flood risk refers to: a) The chance of a flood occurring b) The number of people and properties exposed to floodwaters if a flood occurs c) The vulnerability of people and properties that are exposed to floodwaters d) All of the above.

Last Answer : d) All of the above.

Description : What are the roles of NGOs in disaster related preparedness stage? a. Public awareness and education b. Vulnerability and risk assessment c. Forming and training DNTs, introducing alternative technologies d. All of the above

Last Answer : d. All of the above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : A/an ______ is a system susceptibility or flaw: a) Error b) Vulnerability c) Virus d) None of These

Last Answer : b) Vulnerability

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Globalization can create problems for business because: A. It can result in more competition. B. It reduced vulnerability to political risk and uncertainty when operating abroad. C. It means that they can increase prices. D. All the options given are correct.

Last Answer : All the options given are correct.

Description : .Fluoridation is the adjustment of the fluoride content of a community water supply to optimum levels for caries prevention. Which of the following statement is correct? A. Tooth decay ... in smooth surface caries from in pit and fissures D. Fluoridation increases vulnerability to osteoporosis

Last Answer : C. Greater reduction in smooth surface caries from in pit and fissures

Description : OOP features are i) Increasing productivity ii) Reusability iii) Decreasing maintenance cost iv) High vulnerability A) 1,2 & 4 B) 1,2 & 3

Last Answer : B) 1,2 & 3

Description : Vulnerability scanning in Ethical hacking finds a) Strengths b) Weakness c) a & b d) None of these

Last Answer : b) Weakness

Description : Vulnerability scanning in Ethical hacking finds………. a. Strengths b. Weakness c. A&B d. None of these

Last Answer : b. Weakness

Description : What are the three phases of a security evaluation plan? (Choose three answers.) A. Conduct Security Evaluation B. Preparation C. Conclusion D. Final E. Reconnaissance F. Design Security G. Vulnerability Assessment

Last Answer : A. Conduct Security Evaluation B. Preparation C. Conclusion

Description : Vulnerability scanning in Ethical hacking finds_____. A. Strengths. B. Weakness. C. A &B D. None of these.

Last Answer : B. Weakness.

Description : What are the three phases of a security evaluation plan? (Choose three answers.) A. Conduct Security Evaluation B. Preparation C. Conclusion D. Final E. Reconnaissance F. Design Security G. Vulnerability Assessment

Last Answer : A. Conduct Security Evaluation B. Preparation C. Conclusion

Description : What are the three phases of a security evaluation plan? (Choose three answers.) ∙ A. Conduct Security Evaluation ∙ B. Preparation ∙ C. Conclusion ∙ D. Final ∙ E. Reconnaissance ∙ F. Design Security ∙ G. Vulnerability Assessment

Last Answer : A. Conduct Security Evaluation B. Preparation C. Conclusion

Description : Which of the following was not given by Janis as a symptom of groupthink? (a) Pressure to conform ; (b) An awareness of vulnerability (c) Negative stereotypes of outside opponents ; (d) An illusion of unanimity

Last Answer : (b) An awareness of vulnerability

Description : The primary goal of planning for disasters is to reduce (1) Death (2) Damage (3) Risk (4) Vulnerability

Last Answer : Vulnerability

Description : What was the worst punishment/consequence that your parents gave?

Last Answer : I took 37 lashes in one go at 14 years of age, the worst part? I don’t even remember what it was about, should had done 50 maybe I’d remember

Description : Would Republican politicians continue costly Benghazi probes if they fail to bring Clinton down and there's consequence for them?

Last Answer : Most REp/cons feel they are always right never wrong, so yes probably. Look how far Star pushed it with the Monica L thing saying ,how horrible it was that he lied to the country. That was a costly thing that nevershould have happened.

Description : Do you think it would have a positive or negative consequence on society if The Man lightened up a little?

Last Answer : answer:Most people love it when they see something like that, as long as it is clever and original. The more the merrier, nothing wrong with putting a smile on people’s faces!. But don’t do it unless you are really funny. Spare me some old Star Trek or Darth Vader reference.

Description : What is the consequence of the speech by Wayne Lapierre of NRA on Friday?

Last Answer : It will be interesting to see, won’t it. I don’t think I can make an educated guess because I’m already anti-guns and would be biased.