Phishing
|
Spoofing
|
Steal the information
|
Download malware to your computer or network
|
It is a method of retrieval
|
It is a mean of delivery
|
Phishing attack is use spoofing
|
Spoofing is not necessary
|
Steal the information
|
Not Steal the information
|
Vulnerability
|
Risk
|
Threat
|
Weakness in our Application
|
Potential for loss
|
Anything that is exploit
|
Vulnerability exist in our environment like design, coding, network
|
Risk is where vulnerability and threat
|
Threat is use where application is vulnerable
|
No comments:
Post a Comment