A comprehensive guide to Online Security. This is a Mozilla Open Leaders X Project.
View the Project on GitHub BrianObilo/onlinesecurity.github.io
Cyber criminals usually exploit vulnerabilities to attack networks and systems.
Vulnerabilities are weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
A threat is anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
An asset is anything tangible or intangible that holds value. Assets include people, property and information.
In a nutshell, an asset is what we’re trying to protect. A threat is what we’re trying to protect against. A vulnerability is a weakness or gap in our protection efforts.
This section covers the most common cyber threats that affect organizations and individuals. The threats covered in this section:
Next > 3.1 Social Engineering