From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Understanding vulnerability assessment concepts

Understanding vulnerability assessment concepts

From the course: Certified Ethical Hacker (CEH)

Understanding vulnerability assessment concepts

- A vulnerability is being exposed with the potential of being attacked or harmed. So an exposure is something that is out there and available. And this is with respect to computer systems. I'm not talking about like a human vulnerability, like an emotional vulnerability. I'm talking about computer system vulnerabilities. So a vulnerable computer system means that it is open to the potential of being attacked due to software, hardware or misconfiguration. The possibility of being attacked through the exposure of some sort of vulnerability exists, and the attacker would then exploit that weakness to try to either gain access or maybe create a denial of service situation. And then harm, there is consequence to these things. If I am able to connect to a vulnerable system, and bring it down, I've created a denial of service situation, and perhaps that could cost money, you know in the form of financial loss, reputational damage by bringing that thing down. So where are these…

Contents