{"id":97,"date":"2018-11-09T20:40:49","date_gmt":"2018-11-09T19:40:49","guid":{"rendered":"https:\/\/lars-hilse.de\/lhx18\/?p=97"},"modified":"2018-11-07T18:52:24","modified_gmt":"2018-11-07T17:52:24","slug":"whats-the-difference-between-risk-vulnerability-and-threat-in-cyber-security","status":"publish","type":"post","link":"https:\/\/lars-hilse.de\/lhx18\/2018\/11\/whats-the-difference-between-risk-vulnerability-and-threat-in-cyber-security\/","title":{"rendered":"What\u2019s the difference between risk, vulnerability, and threat in cyber security?"},"content":{"rendered":"<div class=\"ttr_start\"><\/div><p>The vulnerability as a weakness in the efforts to protect a system.<\/p>\n<p>Much less Jan-Erik is threat, which means that an attacker is actively exploiting aforementioned weakness.<\/p>\n<p>The risk on the other hand Determines potential loss and other implications when Evelyn her ability inside an organization is exploited by an attacker.<\/p>\n<div class=\"ttr_end\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Differentiating the terms risk, vulnerability, and threat is quite difficult in a cyber security setting. This post intends to give a clear outline.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,8,13],"tags":[50,38,51,17],"class_list":["post-97","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-global-risks","category-risk-management","tag-risk","tag-risk-management","tag-threat","tag-vulnerability"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paluiP-1z","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/comments?post=97"}],"version-history":[{"count":1,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/97\/revisions"}],"predecessor-version":[{"id":98,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/posts\/97\/revisions\/98"}],"wp:attachment":[{"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/media?parent=97"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/categories?post=97"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lars-hilse.de\/lhx18\/wp-json\/wp\/v2\/tags?post=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}