Next:
Threats
Up:
Vulnerabilities, Threats, and Attacks
Previous:
Vulnerabilities, Threats, and Attacks
Vulnerabilities
Corruption — loss of integrity.
Leaky — loss of confidentiality.
Unavailable or very slow — loss of availability.