Exists when there is a hardware weakness
computer security and information assuarance
A vulnerability is a weak point in a system. This implies a risk, especially to confidential information. An exploit is a means of taking advantage of the vulnerability and using it to take advantage of a system or network. Just because something has been identified as a vulnerability doesn't mean that it has been used to compromise a system. The presence of the exploit means someone has successfully used that weakness and taken advantage of it.
descirbe all the parts of an information system
They are the who what when where and why of a project
A vulnerability indicates that a system has a flaw which can be used to circumvent the security of a system. An exploit is the way in which someone can use a vulnerability to their advantage.
its where a certain information is been used by all department in the organisation
nothing
hardwaretelecommunicationdata managment
Use the Describe Command
Vulnerability assessment is really just finding the vulnerable points in any type of a system in order to fix them. "Basically, vulnerability assessment is looking at a situation or setup and identifitying the weak points."
describe five technilogy and business trends that have enchanced the role of information systems in today compettitive business environment
network mappers