Learn the Language of Vulnerability Assessment: Key Security Terms You Should Know
Tenable
FEBRUARY 22, 2021
A vulnerability could also be a host on the network that lacks modern protections like next-generation firewalls or anti-malware features. Trojans: Malware disguised as programs or files a user needs. Spyware: Programs that monitor activity of infected computers (e.g., Balancing security and compliance.
Let's personalize your content