Phishing
Steal the information
It is a method of retrieval
Phishing attack is use spoofing
Steal the information
Spoofing
Download malware to your computer or network
It is a mean of delivery
Spoofing is not necessary
Not Steal the information
Vulnerability
Weakness in our Application
Vulnerability exist in our environment like design, coding, network
Risk
Potential for loss
Risk is where vulnerability and threat
Threat
Anything that is exploit
Threat is use where application is vulnerable
Comentarios