Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

By "vulnerability" we mean an operating state that could allow malicious actors parties to perform unauthorized actions, for example, an unpatched/un-updated Windows desktop that could be subverted and used as platform for bitcoin mining, spamming, or monitoring of other network traffic to facilitate additional unauthorized actions.  By "compromise" we mean an actual breach, that is, a circumvention of our normal operations by a malicious party that presents an immediate reputational and/or financial risk to the college.

...