6 Common Terminologies In Computer Security

6 Common Terminologies In Computer Security



When it comes to the issue of security of our properties or our devices, it seems to be an issue that concerns all of us. In this article, I want to talk about six common Terminologies in computer Security. Follow me as we will familiarize ourselves with these terms in this article.


#1 Threat

A threat can be seen as an action that has the tendency to violate or compromise computer security. Anything that you do or someone else does that can open up your system to attack is a threat.



#2 Exploit

Exploit has to do with any breach in computer security that allows people to take advantage of the vulnerability of a system.

NHS Header


Let’s say for example you have a weak password on your system or you do not have a password at all and this allows people to steal vital information from your system. That is a typical example of an exploit.



#3 Vulnerability

This has to do with the existence of weakness, design or implementation error that can lead to unexpected, undesirable events that can compromise the security of a system.



#4 Cracker, attacker or intruder

This is an individual who breaks into a system in order to steal or destroy information available on that particular system. Some also like to refer to them as Dark Angels.



#5 Attack

The attack is any action derived from intelligent threats that are meant to violate the security of a system.



#6 Data theft

This has to do with any actions that are carried out in order to steal critical information from the users’ system. Most at times, passwords and other vital documents are stolen in order to use the user’s identity to commit crimes.



Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training.

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.


Fact Check Policy

CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.


Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on Twitter. Click Here.
Many Crypto. One place. Use Roqqu

Hi, I now use RavenBank to send, receive and save money. I also pay my bills with ease, you should try it out too


Fact Check Policy

Adeniyi Salau

Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button