Accessible Online Security

Logo

A comprehensive guide to Online Security. This is a Mozilla Open Leaders X Project.

View the Project on GitHub BrianObilo/onlinesecurity.github.io

Table of Contents

  1. Introduction
  2. Introduction to Cybersecurity
  3. Cybersecurity Threats
  4. Personal Security
  5. Password Security
  6. Secure Online Communications

3. Cybersecurity Threats

Cyber criminals usually exploit vulnerabilities to attack networks and systems.

Vulnerabilities are weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
A threat is anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
An asset is anything tangible or intangible that holds value. Assets include people, property and information.

In a nutshell, an asset is what we’re trying to protect. A threat is what we’re trying to protect against. A vulnerability is a weakness or gap in our protection efforts.

This section covers the most common cyber threats that affect organizations and individuals. The threats covered in this section:

Next > 3.1 Social Engineering