1 00:00:00,300 --> 00:00:07,530 Let's discuss about the term vulnerabilities and penetration testing, you will hear these words many 2 00:00:07,530 --> 00:00:09,180 times in upcoming videos. 3 00:00:09,390 --> 00:00:12,310 I don't want you guys to get confused at that time. 4 00:00:12,330 --> 00:00:14,280 That's why we are discussing these terms. 5 00:00:14,880 --> 00:00:18,090 First of all, we will discuss computer vulnerability. 6 00:00:18,420 --> 00:00:24,820 A computer vulnerability is a cybersecurity term that referred to a defect in our system that can leave 7 00:00:24,820 --> 00:00:26,700 a system open to attack. 8 00:00:27,510 --> 00:00:34,350 This vulnerability could also refer to any type of weakness, presenting a computer itself in a state 9 00:00:34,350 --> 00:00:40,910 of procedure or in anything that allows the information security to be exposed to a threat. 10 00:00:41,490 --> 00:00:48,960 It is possible for network staff and computer users to protect computers from vulnerabilities by regularly 11 00:00:48,960 --> 00:00:51,480 updating software and security patches. 12 00:00:51,990 --> 00:00:54,720 Nowadays, everyone is using smart phone. 13 00:00:55,140 --> 00:01:01,080 Have you ever noticed why smart phone companies give you security updates on a regular basis in your 14 00:01:01,080 --> 00:01:01,750 smartphone? 15 00:01:02,130 --> 00:01:08,910 So this is the reason they found some vulnerabilities in their system so that they give you a security 16 00:01:08,910 --> 00:01:10,840 patch update to fix that bug. 17 00:01:11,340 --> 00:01:18,620 Now we will discuss penetration testing, penetration testing, also called SBN testing or ethical hacking. 18 00:01:18,870 --> 00:01:25,740 It is the practice of testing a computer system, network or web application to find security vulnerabilities 19 00:01:25,890 --> 00:01:27,870 that an attacker could exploit. 20 00:01:28,350 --> 00:01:34,040 Penetration testing can be automated with software applications or performed manually. 21 00:01:34,050 --> 00:01:39,900 Also, the main objective of penetration testing is to identify security weaknesses. 22 00:01:40,230 --> 00:01:45,450 Penetration testing can also be used to test an organization's security policy.