answersLogoWhite

0

Exists when there is a hardware weakness

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What are the different sources of system vulnerability and or abuse?

computer security and information assuarance


What is the difference between an expoit and vulnerability in information security?

A vulnerability is a weak point in a system. This implies a risk, especially to confidential information. An exploit is a means of taking advantage of the vulnerability and using it to take advantage of a system or network. Just because something has been identified as a vulnerability doesn't mean that it has been used to compromise a system. The presence of the exploit means someone has successfully used that weakness and taken advantage of it.


Describe all the parts of an information system?

descirbe all the parts of an information system


Describe the essential components of a project information system?

They are the who what when where and why of a project


How do exploits relate to vulnerabilities?

A vulnerability indicates that a system has a flaw which can be used to circumvent the security of a system. An exploit is the way in which someone can use a vulnerability to their advantage.


Describe integrated information system?

its where a certain information is been used by all department in the organisation


Describe the difference between formal and informal information system?

nothing


Describe three ways in which information system are transforming business?

hardwaretelecommunicationdata managment


Which command do you use to obtain information from the system catalog in oracle?

Use the Describe Command


What does vulnerability assessment entail?

Vulnerability assessment is really just finding the vulnerable points in any type of a system in order to fix them. "Basically, vulnerability assessment is looking at a situation or setup and identifitying the weak points."


Describe the five technology that have enhanced the role of information system in todays compatitive business environment?

describe five technilogy and business trends that have enchanced the role of information systems in today compettitive business environment


Which vulnerability scanner tool can be used to build a map of a system's open port or operating system version?

network mappers