7. Vulnerability
• Loop hole in the network
• By exploting that an attacker is able to enter in the network
• Points are
• Technological weakness
• Configurational weakness
• Security Policies weakness
SPUP, Jodhpur Network Security 7/10
8. Threads
• Who take advantages of vulnerability
• Perform attack through
• Tool
• Script
• Program
SPUP, Jodhpur Network Security 8/10