5.0 Security Fundamentals
Contents
5.1 Security Concepts – Differentiate Network Security Threats, Vulnerabilities, and Exploits
5.2 Security program elements - User awareness, Training, and Physical Access Control)
5.3 Configuring device access control using local passwords on a cisco ios device
5.4 Security password policies elements, such as management and complexity
5.8 Differentiate authentication, authorization, and accounting
5.1 Security Concepts – Differentiate Network Security Threats, Vulnerabilities, and Exploits
Threats: A threat is a potential danger that can cause harm to a network or system. Examples of threats include viruses, malware, hacking, and phishing.
Vulnerabilities: A vulnerability is a weakness or flaw in a system or network that can be exploited by an attacker to gain unauthorized access or cause damage. Vulnerabilities can exist in hardware, software, and processes.