Now that we are familiar with the standards, let's now cover the important terminology that we will be using a lot in the upcoming chapters:
- Vulnerability: A weakness in a system that may allow an attacker to gain unauthorized access to it.
- Spoofing: A situation where an individual or program successfully masks data as something else in order to obtain an unlawful advantage.
- Exploit: A piece of code, a program, a method, or a sequence of commands that takes advantage of a vulnerability to gain unauthorized access to a system/application.
- Payload: The actual code that is executed on the system after/during exploitation to perform the desired task.
- Risk: Anything that can affect the confidentiality, integrity, and availability of data. Unpatched software, misconfigured servers, unsafe internet surfing habits, and so on all contribute to risk.
- Threat...