Threats & Attacks

Req 4a — Threats & Vulnerabilities

4a.
Define the terms vulnerability, threat, and exploit, and give an example of each that might apply to a website or software product you use.

These three words — vulnerability, threat, and exploit — are the building blocks of cybersecurity language. Every attack, every defense, every news story about a breach comes back to these concepts. Understanding how they fit together is like learning the basic vocabulary of a new language.

Vulnerability

A vulnerability is a weakness or flaw in a system that could be used to cause harm. It is a door left unlocked, a window with a broken latch, a gap in the fence. The vulnerability exists whether or not anyone takes advantage of it.

Examples:

Think of a vulnerability like a crack in a dam. The crack may sit there for years without causing a flood — but it is always a risk.

Threat

A threat is anything that could exploit a vulnerability to cause damage. Threats can be people (hackers, disgruntled employees), software (malware, ransomware), or events (natural disasters that knock out data centers). A threat is the potential for harm — the person who might notice that unlocked door.

Examples:

Exploit

An exploit is the actual method or action used to take advantage of a vulnerability. It is the moment the unlocked door gets opened. An exploit turns a theoretical risk into a real attack.

Examples:

How They Fit Together

The relationship is sequential:

  1. A vulnerability exists (a flaw or weakness)
  2. A threat recognizes the vulnerability (someone or something that could cause harm)
  3. An exploit takes advantage of it (the actual attack)

Here is a concrete example using a website you might use:

ConceptSocial Media Example
VulnerabilityThe site allows unlimited login attempts with no lockout
ThreatAn attacker with a list of common passwords
ExploitThe attacker runs an automated program that tries thousands of passwords against your account until one works (called a brute force attack)

And another example:

ConceptGaming Platform Example
VulnerabilityThe game’s chat system does not filter links
ThreatA scammer who creates fake “free V-Bucks” websites
ExploitThe scammer posts links in game chat; players who click enter their login credentials on a fake site, giving the scammer their accounts

Applying This to Your Life

For your counselor, think about a website or app you actually use. Walk through the three concepts:

  1. What vulnerability might it have?
  2. What threat could take advantage of it?
  3. What would the exploit look like in practice?

You do not need to find a real vulnerability — this is a thought exercise about understanding the concepts.

Hackers & Cyber Attacks — Crash Course Computer Science A fast-paced, entertaining overview of how cyber attacks work from the Crash Course team.
Three-step attack chain diagram: Vulnerability (cracked wall), Threat (figure noticing the crack), Exploit (figure reaching through)