answersLogoWhite

0


Best Answer

Exists when there is a hardware weakness

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What does not describe an information system vulnerability?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the different sources of system vulnerability and or abuse?

computer security and information assuarance


What is the difference between an expoit and vulnerability in information security?

A vulnerability is a weak point in a system. This implies a risk, especially to confidential information. An exploit is a means of taking advantage of the vulnerability and using it to take advantage of a system or network. Just because something has been identified as a vulnerability doesn't mean that it has been used to compromise a system. The presence of the exploit means someone has successfully used that weakness and taken advantage of it.


Describe all the parts of an information system?

descirbe all the parts of an information system


How do exploits relate to vulnerabilities?

A vulnerability indicates that a system has a flaw which can be used to circumvent the security of a system. An exploit is the way in which someone can use a vulnerability to their advantage.


Describe the essential components of a project information system?

They are the who what when where and why of a project


Describe integrated information system?

its where a certain information is been used by all department in the organisation


Describe the difference between formal and informal information system?

nothing


Describe three ways in which information system are transforming business?

hardwaretelecommunicationdata managment


What does vulnerability assessment entail?

Vulnerability assessment is really just finding the vulnerable points in any type of a system in order to fix them. "Basically, vulnerability assessment is looking at a situation or setup and identifitying the weak points."


Which command do you use to obtain information from the system catalog in oracle?

Use the Describe Command


Which vulnerability scanner tool can be used to build a map of a system's open port or operating system version?

network mappers


What is the purpose of a vulnerability scanner?

A network vulnerability scanner is a program written to find vulnerabilities in other programs run on either a computer or the network. There are different types of vulnerability scanners based on what the scanner is scanning.