Threat Terminology

Many types of malicious or suspicious activities are presented to information systems. To understand how to protect systems, you first need to understand the nature of these threats and attacks. To begin, watch this video to understand threats and attacks. What are the differences between these two concepts?

Source:  learnintsec, 
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Friday, November 20, 2020, 3:02 PM