Using two examples each, explain the difference between cyber technical vulnerabilities and people‐related vulnerabilities.
Cyber technical vulnerabilities are those characteristics or configurations that can be exploited by an attacker to gain unauthorized access or misuse your network and its resources. Examples are Security Misconfiguration, Failure to restrict URL Access.
People‐related vulnerabilities are vulnerabilities that occurs due to human errors where most of them are unintentional. All an attacker needs is an entry point into the organization’s network. Examples are Lack of security knowledge, Failure to follow policies and procedures.
Comments
Leave a comment