An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access.
Which of the following describes the administrator's discovery?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
https://www.beyondtrust.com/blog/entry/privilege-escalation-attack-defense-explainedThe IT administrator's discovery is a vulnerability.
A vulnerability is a weakness or flaw in a system or application that can be exploited by attackers to gain unauthorized access, cause damage, or steal data. In this case, the missing crucial practice on the server makes it vulnerable to a recent exploit that could gain root access.
A threat is an event or action that can exploit a vulnerability, potentially causing harm to a system or organization. For example, a hacker attempting to exploit the vulnerability on the server would be considered a threat.
A breach is a successful unauthorized access or disclosure of sensitive data. A breach can occur as a result of a vulnerability being exploited by a threat actor.
Risk is the likelihood of a threat exploiting a vulnerability, resulting in harm or loss to an organization. It is often measured by assessing the likelihood and potential impact of a threat exploiting a vulnerability. In this scenario, the IT administrator has discovered a vulnerability, which could lead to a higher risk of a successful attack on the server if not remediated.