Summary
We have reached the end of the chapter, in which you have learned what threats and attacks are, going through malware and viruses, spoofing, or phishing. You now know the difference between the terms threats and attacks, and even the variety of threats, internal or external.
Next, we entered the world of vulnerabilities, exploring different existing ones, such as software vulnerabilities, network vulnerabilities, and so on.
Then, we explored exploits, what they are, and the different types. We then looked at patches and updates, how they work, and how to implement them. Last but not least, we explored security assessments.
The following chapter will explore the types of vulnerabilities in detail. The types of existing vulnerabilities will be discussed in depth.