From the course: Cisco Certified Network Associate (CCNA) v1.1 (200-301) Cert Prep

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Threats vs. vulnerabilities

Threats vs. vulnerabilities

(bright music) - [Instructor] In this video, we want to contrast a couple of terms, a threat, which we could call an exploit, and a vulnerability. First, consider a vulnerability. A vulnerability is some sort of a weakness or a flaw within a system that is supposed to be secured. An example might be having a weak password to get logged into a server. Another example might be not applying a patch to an underlying operating system to fix a known issue. While a threat or an exploit is something that can take advantage of a vulnerability. If somebody has a weak password, the exploit might be to run some sort of a brute force password-cracking program that's going to try a bunch of different passwords until it eventually guesses the right password. Or maybe we have a more advanced exploit or running some sort of a SQL injection. But an exploit is taking advantage of that vulnerability. And once a vulnerability is discovered, typically the developers, they go to work to try to fix that…

Contents