Main Content

Cybersecurity Curriculum

2.1.2 Characteristics of Cyber-Operations (attack and exploitation)

All cyber-operations – both attacks, and exploitations – requires three things: a vulnerability, access to the vulnerability, and a payload.