DRAG DROP
Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:
DRAG DROP
Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:
Configuration Review — Risk assessment
Lack of ACL — Vulnerability
————–
Leakage of info is not an exploit but its a Threat
while exploit is the Network compromise.
==> Exploit is the action item.
An exploit will result in What is identified as Threat.