« Back to Glossary Index

Any ongoing threat on a system. They can come from internal users who fall victim to phishing attacks or an outsider who finds a vulnerability in a web app and exploits it.

« Back to Glossary Index