Main Content

Cybersecurity Curriculum

1.3.5 User-based Vulnerabilities

Some vulnerabilities do not rely on specific technical hacks, but simply on the susceptibility of individual users.