The mixed threat attacks generally try to exploit multiple vulnerabilities to get into a system.
Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors.
Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment.
The worm exploited several vulnerabilities to gain entry to targeted systems, including:
Terrorist tactics tend to favor attacks that avoid effective countermeasures and exploit vulnerabilities.
They can then attempt to exploit potential vulnerabilities in any services they find.
Worms spread by exploiting vulnerabilities in operating systems.
Clever terrorists can use innovative ways to exploit vulnerabilities.
Often, these worms are specific to a single web site, spreading quickly by exploiting specific vulnerabilities.
IT risk: the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization.