Posts

Showing posts from March, 2024

Software Quality Assurance Approach:

Click it

Difference between Preemptive and Non-Preemptive Scheduling

Image

Incident Response Terms in Cyber Security

Threat: Definition: A potential for harm to information or systems. Example: Malware, hacking attempts, or social engineering attacks. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Vulnerability: Definition: A weakness in a system or process that could be exploited. Example: Unpatched software, misconfigured settings, or weak passwords. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Asset: Definition: Any information or resource that needs protection (e.g., data, hardware, software). Example: Customer databases, servers, intellectual property. -----------------------------------------------------------------------------------------------