answersLogoWhite

0


Best Answer

Your computer is vulnerable by the protection of your firewall.

If your firewall is open, or have no firewall, you are pretty much a siting duck.

A computer threat is a virus that infects your computer to do unwanted and/or involuntary actions you did not request/intend/mistakenly do.

The computer threat seeks for openness of a computer vulnerability.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is relation between computer threat and computer vulnerability?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is threat and vulnerability a function of risk?

No.


Risk is a function of?

threat, vulnerability and impact


Is vulnerability the so what factor of risk assessment?

An advantage of integrating OPSEC principles in your day-to-day operations is that it:


Risk is a function of the?

D. threat, vulnerability, and impact.


When Assessing a vulnerability in conjunction with the threat and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk?

True


What is the diffirence between Hazard exposure and vulnerability?

A risk assessment looks at how the threat can exploit the vulnerability of the asset in question, in terms of Confidentiality, integrity and Availability (CIA). A vulnerability assessment is a intake of the assets on hand and the noted vulnerability associated with them. A risk assessment is by far deeper assessment, and can incorporate other forms of assessments to formalize a single set of recommendations.


Assessing a vulnerability in conjunction with the threat and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk?

A. True


Vulnerabilities fall into which three categories?

risk = criticality x threat vulnerability


What is the element of the risk management process?

threat assessment, criticality assessment, and vulnerability assessment.


Why is it important to address each identified threat or vulnerability from a CIA perspective?

Do some more research


The probability that an adversary will exploit a weakness in your operation tempered by the impact to your mission is defined as the?

Vulnerability


Which of the following is considered a potential insider threat vulnerability?

All of them